700-280 - Email Security for Field Engineers
Go back to Cisco
Which option describes when LDAP domain assignments are used?
When users are in separate domains, each of which has their own directory
Which command is used to enable weighted filtering in an Email Security Appliance?
What is the best solution to prevent directory harvest attacks?
Enable LDAP Accept.
Which option describes when a DLP incident occurs?
when potentially sensitive content appears in a message
Which of the following features need to be enabled to create reports representing email trends across a company with several C-Series appliances? (Choose two.)
Centralized Reporting on the M-Series
Centralized Reporting on the C-Series
Your customer is using the encryption plug-in for Microsoft Outlook. Which content filter condition is used to match on the tag that is set by the plug-in?
Which of the following security features are enabled for outgoing mail by default? (Choose three)
Which ESA function maintains a set of rules that control incoming connections from remote hosts for a listener?
Which approach for SenderBase Reputation Score filtering would ensure a very small false positive rate and achieve better system performance?
Which of the following two RAT entries will accept mail for example.com and all of its sub- domains? (Choose two.)
Which of the following types of DNS records deals with mail delivery for a specific domain?
By default, how do Outbreak filters avoid quarantining false positives?
False positives are released as updates provide a better description of suspected attachment.
A new C-160 has been delivered and needs to be configured. What subnet and C-Series interface does your laptop need to be configured on?
Which of the following filters can only be applied to outbound messages?
Which of the following parameters are used by the Anti-Spam engine? (Choose three.)
The characteristics of the message (random dots, multiple colors)
The sending mail domains reputation
The reputation of URLs in the message
When the Cisco ESA is configured to use Centralized Message Tracking, which default port is used between the device and the Cisco Security Management Appliance?
During which stage in a mail flow on a Cisco Email Security Appliance does content filtering occur?
Reputation filtering (SBRS) > mail policies > message filters > antispam > antivirus > content filter
Which option describes the difference between public and private listeners?
Only the public listener can be configured to process incoming mail.
Which default port is used by the Cisco ESA to quarantine the message on the Cisco Security Management Appliance?
Which of the following security features are enabled for incoming mail by default? (Choose three.)
Which of the following is designed to block message campaigns that the recipient unknowingly subscribed to?
Marketing Mail Detection
Which ESA feature is used to apply smart identifiers?
Which statement about the grep command is true?
It performs a case-sensitive search.
Using default settings, what describes the difference between rating suspect and positive spam?
Suspect spam is scored between 50 and 89 and positive is 90 or greater.
By default, the outgoing mail will be scanned by which one of the following?
Which of the following vendors produce Anti-Virus engines for the C-Series? (Choose two.)
Which option describes when DLP scanning occurs in the email pipeline?
Immediately after outbreak filters
Which option describes the function of the RSA Enterprise Manager?
Centralized management of DLP polices, remediation, and reporting
When saving a configuration file that will be reloaded into the appliance, which one of the following must be changed before saving?
Unmask the password strings
In a "one armed installation" using a single listener, how would the system differentiate between incoming and outgoing email?
Mail flow direction is determined by using the source IP address.
At what point in the SMTP conversation can the SMTP client send message headers?
Between DATA and a period"." on a single line
When configuring CRES, where do you enable read receipts?
In the encryption profile
Which statement describes how the Cisco Email Security Appliance connects to these hosts if multiple LDAP servers are specified for a single profile?
It load balances connections among all hosts listed.
Which option describes how the Cisco ESA fits into a network?
It handles SMTP-related traffic by routing the packets.
If the marketing message detection feature mislabels legitimate mail as marketing, which action corrects this error?
Send samples of mislabeled legitimate mail to [email protected]
Which two options are default characteristics of the RSA DLP feature? (Choose two.)
It is not enabled on the Cisco ESA.
It requires a feature key.
While running the system setup wizard, what are the default settings for Senderbase Network Participation and Auto Support?
SBNP: onAuto Support: on
Which two network topologies can be configured on the Cisco C170 appliance? (Choose two.)
The Data 1 interface is configured with one public listener. The Data 2 interface is configured with a private listener.Management access is performed through a third Ethernet interface that is dedicated to management.
Which two service problems can the Cisco Email Security Appliance solve? (Choose two.)
Which option correctly describes the encryption technologies that should be used with "TLS Preferred" Guaranteed Secure Delivery?
Try to use TLS. If it fails, use envelope encryption.