لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which benefit does enabling external spam quarantine on Cisco SMA provide?
A. bility to back up spam quarantine from multiple Cisco ESAs to one central console
B. ccess to the spam quarantine interface on which a user can release, duplicate, or delete
C. bility to scan messages by using two engines to increase a catch rate
D. bility to consolidate spam quarantine data from multiple Cisco ESA to one central console
عرض الإجابة
اجابة صحيحة: D
السؤال #2
Which antispam feature is utilized to give end users control to allow emails that are spam to be delivered to their inbox, overriding any spam verdict and action on the Cisco ESA?
A. nd user allow list
B. nd user spam quarantine access
C. nd user passthrough list
D. nd user safelist
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Which feature must be activated on a Cisco Secure Email Gateway to combat backscatter?
A. raymail Detection
B. ounce Verification
C. orged Email Detection
D. ounce Profile
عرض الإجابة
اجابة صحيحة: B
السؤال #4
Which type of query must be configured when setting up the Spam Quarantine while merging notifications?
A. pam Quarantine Alias Routing Query
B. pam Quarantine Alias Consolidation Query
C. pam Quarantine Alias Authentication Query
D. pam Quarantine Alias Masquerading Query
عرض الإجابة
اجابة صحيحة: B
السؤال #5
An engineer tries to implement phishing simul-ations to test end users, but they are being blocked by the Cisco Secure Email Gateway appliance. Which two components, when added to the allow list, allow these simul-ations to bypass antispam scanning? (Choose two.)
A. omains
B. enders
C. eputation score
D. eceivers
E. pf check
عرض الإجابة
اجابة صحيحة: AB
السؤال #6
09. Which action must be taken before a custom quarantine that is being used can be deleted?
A. eletethequarantinethatisassignedtoafilte
B. emovethequarantinefromthemessageactionofafilte
C. eleteonlytheunusedquarantine
D. eletethequarantinethatisnotassignedtoafilte
عرض الإجابة
اجابة صحيحة: B
السؤال #7
Which attack is mitigated by using Bounce Verification?
A. poof
B. enial of service
C. avesdropping
D. murf
عرض الإجابة
اجابة صحيحة: B
السؤال #8
Which SMTP extension does Cisco ESA support for email security?
A. TRN
B. TF8SMTP
C. IPELINING
D. TARTTLS
عرض الإجابة
اجابة صحيحة: D
السؤال #9
Which process is skipped when an email is received from safedomain.com, which is on the safelist?
A. essage filter
B. ntivirus scanning
C. utbreak filter
D. ntispam scanning
عرض الإجابة
اجابة صحيحة: A
السؤال #10
01. What is the default HTTPS port when configuring spam quarantine on Cisco ESA?
A. 3
B. 2
C. 43
D. 0
عرض الإجابة
اجابة صحيحة: A
السؤال #11
What is a benefit of deploying Cisco SMA?
A. centralized management of logs for Cisco ESA appliances
B. centralized management of botnet directories
C. centralized management of software updates for Cisco ESA appliances
D. centralized management of quarantined email
عرض الإجابة
اجابة صحيحة: C
السؤال #12
DRAG DROP (DRAG AND DROP IS NOT SUPPORTED)Drag and drop the Cisco ESA reactions to a possible DLP from the left onto the correct action types on the right.
A. ee Explanation section for answer
عرض الإجابة
اجابة صحيحة: A
السؤال #13
Email encryption is configured on a Cisco ESA that uses CRES. Which action is taken on a message when CRES is unavailable?
A. t is requeued
B. t is sent in clear text
C. t is dropped and an error message is sent to the sender
D. t is encrypted by a Cisco encryption appliance
عرض الإجابة
اجابة صحيحة: B
السؤال #14
An administrator notices that the Cisco ESA delivery queue is consistently full. After further investigation, it is determined that the IP addresses currently in use by the Cisco ESA are being rate-limited by some destinations. The administrator creates a new interface with an additional IP address using virtual gateway technology, but the issue is not solved. Which configuration change resolves the issue?
A. Use the CLI command alt-src-host to set the new interface as a possible delivery candidate
B. Use the CLI command loadbalance auto to enable mail delivery over all interfaces
C. Use the CLI command deliveryconfig to set the new interface as the primary interface for mail delivery
D. Use the CLI command altsrchost to set the new interface as the source IP address for all mail
عرض الإجابة
اجابة صحيحة: B
السؤال #15
Refer to the exhibit. How should this configuration be modified to stop delivering Zero Day malware attacks?
A. Change Unscannable Action from Deliver As Is to Quarantine
B. Change File Analysis Pending action from Deliver As Is to Quarantine
C. Configure mailbox auto-remediation
D. Apply Prepend on Modify Message Subject under Malware Attachments
عرض الإجابة
اجابة صحيحة: C
السؤال #16
An administrator needs to configure a Cisco ESA to block specific domains based on their reputation. Which service within the Cisco ESA should be utilized to accomplish this task?
A. Receiving SMTP Policy
B. Data Loss Prevention
C. Anti-Virus
D. Sender Group
عرض الإجابة
اجابة صحيحة: A
السؤال #17
An engineer wants to ensure that emails received by company users that contain URLs do not make them susceptible to data loss from accessing malicious or undesired external content sources Which two features must be configured on Cisco Secure Email Gateway to meet this requirement1? (Choose two.)
A. ntispam scanning
B. ata loss prevention
C. raymail detection
D. RL filtering
E. ntivirus scanning
عرض الإجابة
اجابة صحيحة: AD
السؤال #18
Which two configurations are used on multiple LDAP servers to connect with Cisco ESA? (Choose two.)
A. 025
B. 443
C. 025
D. 443
عرض الإجابة
اجابة صحيحة: AD
السؤال #19
04. How does the graymail safe unsubscribe feature function?
A. tstripsthemaliciouscontentoftheURIbeforeunsubscribi
B. tcheckstheURIreputationandcategoryandallowsthecontentfiltertotakeanactiononi
C. tredirectstheenduserwhoclickstheunsubscribebuttontoasandboxenvironmenttoallowasafeunsubscribe
D. tchecksthereputationoftheURIandperformstheunsubscribeprocessonbehalfoftheenduse
عرض الإجابة
اجابة صحيحة: D
السؤال #20
What is the maximum message size that can be configured for encryption on the Cisco ESA?
A. 0 MB
B. 5 MB
C. 5 MB
D. 0 MB
عرض الإجابة
اجابة صحيحة: A
السؤال #21
How does the graymail safe unsubscribe feature function?
A. et up the interface group with the flag
B. ssue the altsrchost command
C. ap the envelope sender address to the host
D. pply a filter on the message
عرض الإجابة
اجابة صحيحة: D
السؤال #22
What is the default port to deliver emails from the Cisco ESA to the Cisco SMA using the centralized Spam Quarantine?
A. ee Explanation section for answer
عرض الإجابة
اجابة صحيحة: C
السؤال #23
When the Spam Quarantine is configured on the Cisco ESA, what validates end-users via LDAP during login to the End-User Quarantine?
A. nabling the End-User Safelist/Blocklist feature
B. pam Quarantine External Authentication Query
C. pam Quarantine End-User Authentication Query
D. pam Quarantine Alias Consolidation Query
عرض الإجابة
اجابة صحيحة: C
السؤال #24
Which SMTP extension does Cisco ESA support for email security?
A. TRN
B. TF8SMTP
C. IPELINING
D. TARTTLS
عرض الإجابة
اجابة صحيحة: D
السؤال #25
03. When the Cisco ESA is configured to perform antivirus scanning, what is the default timeout value?
A. 0second
B. 0second
C. 0second
D. 20second
عرض الإجابة
اجابة صحيحة: C
السؤال #26
Which two factors must be considered when message filter processing is configured? (Choose two.)
A. t strips the malicious content of the URI before unsubscribing
B. t checks the URI reputation and category and allows the content filter to take an action on it
C. t redirects the end user who clicks the unsubscribe button to a sandbox environment to allow a safe unsubscribe
D. t checks the reputation of the URI and performs the unsubscribe process on behalf of the end user
عرض الإجابة
اجابة صحيحة: AE
السؤال #27
A Cisco ESA administrator has several mail policies configured. While testing policy match using a specific sender, the email was not matching the expected policy.What is the reason of this?
A. The “From” header is checked against all policies in a top-down fashion
B. The message header with the highest priority is checked against each policy in a top-down fashion
C. The “To” header is checked against all policies in a top-down fashion
D. The message header with the highest priority is checked against the Default policy in a top-down fashion
عرض الإجابة
اجابة صحيحة: D
السؤال #28
An analyst creates a new content dictionary to use with Forged Email Detection. Which entry will be added into the dictionary?
A. ycompany
B. lpha Beta
C. Alpha\\ Beta$
D. lpha
عرض الإجابة
اجابة صحيحة: A
السؤال #29
A Cisco ESA administrator is creating a Mail Flow Policy to receive outbound email from Microsoft Exchange. Which Connection Behavior must be selected to properly process the messages?
A. Delay
B. Accept
C. Relay
D. Reject
عرض الإجابة
اجابة صحيحة: C
السؤال #30
Which Cisco ESA security service is configured only through an outgoing mail policy?
A. ntivirus
B. LP
C. utbreak Filters
D. MP
عرض الإجابة
اجابة صحيحة: B
السؤال #31
When email authentication is configured on Cisco ESA, which two key types should be selected on the signing profile? (Choose two.)
A. rotection level
B. pam threshold
C. pam timeout
D. aximum depth of recursion scan
عرض الإجابة
اجابة صحيحة: AC
السؤال #32
An administrator manipulated the subnet mask but was still unable to access the user interface. How must the administrator access the appliance to perform the initial configuration?
A. Use the data 2 port
B. Use the serial or console port
C. Use the data 1 port
D. Use the management port
عرض الإجابة
اجابة صحيحة: B
السؤال #33
Which two features of Cisco Email Security are added to a Sender Group to protect an organization against email threats? (Choose two.)
A. referred-verify
B. ff
C. referred
D. equired
عرض الإجابة
اجابة صحيحة: CD
السؤال #34
Which feature must be configured before an administrator can use the outbreak filter for nonviral threats?
A. uarantine threat level
B. ntispam
C. ata loss prevention
D. ntivirus
عرض الإجابة
اجابة صحيحة: B
السؤال #35
An engineer tries to implement phishing simulations to test end users, but they are being blocked by the Cisco ES
A. Which two components, when added to the allow list, allow these simulations to bypass antispam scanning? (Choose two
B. domains
C. reputation score
D. spf check
E. senders
عرض الإجابة
اجابة صحيحة: CE
السؤال #36
Which benefit does enabling external spam quarantine on Cisco SMA provide?
A. bility to back up spam quarantine from multiple Cisco ESAs to one central console
B. ccess to the spam quarantine interface on which a user can release, duplicate, or delete
C. bility to scan messages by using two engines to increase a catch rate
D. bility to consolidate spam quarantine data from multiple Cisco ESA to one central console
عرض الإجابة
اجابة صحيحة: D
السؤال #37
06. What are two prerequisites for implementing undesirable URL protection in Cisco ESA?
A. nableoutbreakfilte
B. nableemailrelay
C. nableantispamscanni
D. nableportbounci
عرض الإجابة
اجابة صحيحة: AC
السؤال #38
When outbreak filters are configured, which two actions are used to protect users from outbreaks? (Choose two.)
A. rovisioned email encryption profile
B. essage encryption from a content filter that select "Message Encryption" over TLS
C. essage encryption from the mail flow policies with "CRES" selected
D. ontent filter to forward the email to the Cisco Registered Envelope server
عرض الإجابة
اجابة صحيحة: AD
السؤال #39
08. What occurs when configuring separate incoming mail policies?
A. essagesplinteri
B. essageexcepti
C. essagedetachme
D. essageaggregati
عرض الإجابة
اجابة صحيحة: A
السؤال #40
What are two prerequisites for implementing undesirable URL protection in Cisco ESA? (Choose two.)
A. ee Explanation section for answer
عرض الإجابة
اجابة صحيحة: AC
السؤال #41
Which action must be taken before a custom quarantine that is being used can be deleted?
A. elete the quarantine that is assigned to a filter
B. elete the quarantine that is not assigned to a filter
C. elete only the unused quarantine
D. emove the quarantine from the message action of a filter
عرض الإجابة
اجابة صحيحة: D
السؤال #42
Which type of attack is prevented by configuring file reputation filtering and file analysis features?
A. enial of service
B. ero-day
C. ackscatter
D. hishing
عرض الإجابة
اجابة صحيحة: B
السؤال #43
An administrator identifies that, over the past week, the Cisco ESA is receiving many emails from certain senders and domains which are being consistently quarantined. The administrator wants to ensure that these senders and domain are unable to send anymore emails.Which feature on Cisco ESA should be used to achieve this?
A. incoming mail policies
B. safelist
C. blocklist
D. S/MIME Sending Profile
عرض الإجابة
اجابة صحيحة: A
السؤال #44
10. Which two features are applied to either incoming or outgoing mail policies?
A. ndicationofCompromise
B. pplicationfilteri
C. utbreakfilte
D. enderreputationfilteri
عرض الإجابة
اجابة صحيحة: C
السؤال #45
05. Which type of attack is prevented by configuring file reputation filtering and file analysis features?
A. enialofservice
B. ero-day
C. ackscatte
D. hishi
عرض الإجابة
اجابة صحيحة: B
السؤال #46
Which feature utilizes sensor information obtained from Talos intelligence to filter email servers connecting into the Cisco ESA?
A. enderBase Reputation Filtering
B. onnection Reputation Filtering
C. alos Reputation Filtering
D. pamCop Reputation Filtering
عرض الإجابة
اجابة صحيحة: A
السؤال #47
07. Which process is skipped when an email is received from safedomain.com, which is on the safelist?
A. utbreakfilte
B. ntivirusscanni
C. essagefilte
D. ntispamscanni
عرض الإجابة
اجابة صحيحة: D
السؤال #48
Which Cisco Secure Email Threat Defense visibility and remediation mode is only available when using Cisco Secure Email Gateway as the message source?
A. asic Authentication
B. o Authentication
C. icrosoft 365 Authentication
D. isco Security Cloud Sign On
عرض الإجابة
اجابة صحيحة: B
السؤال #49
Refer to the exhibit. An engineer is trying to connect to a Cisco ESA using SSH and has been unsuccessful. Upon further inspection, the engineer notices that there is a loss of connectivity to the neighboring switch.Which connection method should be used to determine the configuration issue?
A. Telnet
B. HTTPS
C. Ethernet
D. serial
عرض الإجابة
اجابة صحيحة: D
السؤال #50
DRAG DROP (DRAG AND DROP IS NOT SUPPORTED)An Encryption Profile has been set up on the Cisco ES
A. rag and drop the steps from the left for creating an outgoing content filter to encrypt emails that contains the subject "Secure:" into the correct order on the right
عرض الإجابة
اجابة صحيحة: A
السؤال #51
An administrator is managing multiple Cisco ESA devices and wants to view the quarantine emails from all devices in a central location.How is this accomplished?
A. Disable the VOF feature before sending SPAM to the external quarantine
B. Configure a mail policy to determine whether the message is sent to the local or external quarantine
C. Disable the local quarantine before sending SPAM to the external quarantine
D. Configure a user policy to determine whether the message is sent to the local or external quarantine
عرض الإجابة
اجابة صحيحة: B
السؤال #52
To comply with a recent audit, an engineer must configure anti-virus message handling options on the incoming mail policies to attach warnings to the subject of an email.What should be configured to meet this requirement for known viral emails?
A. Virus Infected Messages
B. Unscannable Messages
C. Encrypted Messages
D. Positively Identified Messages
عرض الإجابة
اجابة صحيحة: C
السؤال #53
Which feature utilizes sensor information obtained from Talos intelligence to filter email servers connecting into the Cisco ESA?
A. enderBase Reputation Filtering
B. onnection Reputation Filtering
C. alos Reputation Filtering
D. pamCop Reputation Filtering
عرض الإجابة
اجابة صحيحة: A
السؤال #54
When DKIM signing is configured, which DNS record must be updated to load the DKIM public signing key?
A. AAA record
B. TR record
C. XT record
D. X record
عرض الإجابة
اجابة صحيحة: C
السؤال #55
02. An administrator is trying to enable centralized PVO but receives the error, "Unable to proceed with Centralized Policy, Virus and Outbreak Quarantines configuration as esa1 in Cluster has content filters / DLP actions available at a level different from the cluster level."
A. ontentfiltersareconfiguredatthemachine-levelonesa1
B. LPisconfiguredatthecluster-levelonesa2
C. LPisconfiguredatthedomain-levelonesa1
D. LPisnotconfiguredonhost1
عرض الإجابة
اجابة صحيحة: D
السؤال #56
An administrator is trying to enable centralized PVO but receives the error, "Unable to proceed with Centralized Policy, Virus and Outbreak Quarantines configuration as esa1 in Cluster has content filters/ DLP actions available at a level different from the cluster level." What is the cause of this error?
A. ontent filters are configured at the machine-level on esa1
B. LP is configured at the cluster-level on esa2
C. LP is configured at the domain-level on esa1
D. LP is not configured on host1
عرض الإجابة
اجابة صحيحة: D
السؤال #57
What is a benefit of enabling external SPAM quarantine on Cisco SMA?
A. It provides access to the SPAM quarantine interface on which a user can release, duplicate, or delete
B. It provides the ability to scan messages by using two engines to increase a catch rate
C. It provides the ability to consolidate SPAM quarantine data from multiple Cisco ESAs to one central console
D. It provides the ability to back up SPAM quarantine from multiple Cisco ESAs to one central console
عرض الإجابة
اجابة صحيحة: C
السؤال #58
What is the order of virus scanning when multilayer antivirus scanning is configured?
A. he default engine scans for viruses first and the McAfee engine scans for viruses second
B. he Sophos engine scans for viruses first and the McAfee engine scans for viruses second
C. he McAfee engine scans for viruses first and the default engine scans for viruses second
D. he McAfee engine scans for viruses first and the Sophos engine scans for viruses second
عرض الإجابة
اجابة صحيحة: C
السؤال #59
A Cisco Secure Email Gateway administrator recently enabled the Outbreak Filters Global Service Setting to detect Viral as well as Non-Viral threat detection, with no detection of Non-viral threats after 24 hours of monitoring Outbreak Filters What is the reason that Non-Viral threat detection is not detecting any positive verdicts?
A. on-Viral threat detection requires Antivirus or AMP enablement to properly function
B. he Outbreak Filters option Graymail Header must be enabled
C. on-Viral threat detection requires AntiSpam or Intelligent Multi-Scan enablement to properly function
D. he Outbreak Filters option URL Rewriting must be enabled
عرض الإجابة
اجابة صحيحة: C
السؤال #60
Which suboption must be selected when LDAP is configured for Spam Quarantine End-User Authentication?
A. esignate as the active query
B. pdate Frequency
C. erver Priority
D. ntity ID
عرض الإجابة
اجابة صحيحة: A
السؤال #61
When the Spam Quarantine is configured on the Cisco ESA, what validates end-users via LDAP during login to the End-User Quarantine?
A. nabling the End-User Safelist/Blocklist feature
B. pam Quarantine External Authentication Query
C. pam Quarantine End-User Authentication Query
D. pam Quarantine Alias Consolidation Query
عرض الإجابة
اجابة صحيحة: C
السؤال #62
Which two actions are configured on the Cisco ESA to query LDAP servers? (Choose two.)
A. essage splintering
B. essage exceptions
C. essage detachment
D. essage aggregation
عرض الإجابة
اجابة صحيحة: AD
السؤال #63
An engineer is testing mail flow on a new Cisco ESA and notices that messages for domain abc.com are stuck in the delivery queue. Upon further investigation, the engineer notices that the messages pending delivery are destined for 192.168.1.11, when they should instead be routed to 192.168.1.10.What configuration change needed to address this issue?
A. Add an address list for domain abc
B. Modify Destination Controls entry for the domain abc
C. Modify the SMTP route for the domain and change the IP address to 192
D. Modify the Routing Tables and add a route for IP address to 192
عرض الإجابة
اجابة صحيحة: C
السؤال #64
A network administrator is modifying an outgoing mail policy to enable domain protection for the organization. A DNS entry is created that has the public key.Which two headers will be used as matching criteria in the outgoing mail policy? (Choose two.)
A. message-ID
B. sender
C. URL reputation
D. from
E. mail-from
عرض الإجابة
اجابة صحيحة: BD
السؤال #65
Which two query types are available when an LDAP profile is configured? (Choose two.)
A. DAP Query
B. MTP AUTH
C. MTP TLS
D. DAP BIND
عرض الإجابة
اجابة صحيحة: DE

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: