What is the order of virus scanning when multilayer antivirus scanning is configured?
A. The default engine scans for viruses first and the McAfee engine scans for viruses second.
B. The Sophos engine scans for viruses first and the McAfee engine scans for viruses second.
C. The McAfee engine scans for viruses first and the default engine scans for viruses second.
D. The McAfee engine scans for viruses first and the Sophos engine scans for viruses second.
Which type of query must be configured when setting up the Spam Quarantine while merging notifications?
A. Spam Quarantine Alias Routing Query
B. Spam Quarantine Alias Consolidation Query
C. Spam Quarantine Alias Authentication Query
D. Spam Quarantine Alias Masquerading Query
Which two are configured in the DMARC verification profile? (Choose two.)
A. name of the verification profile
B. minimum number of signatures to verify
C. ESA listeners to use the verification profile
D. message action into an incoming or outgoing content filter
E. message action to take when the policy is reject/quarantine
What is the default HTTPS port when configuring spam quarantine on Cisco ESA?
A. 83
B. 82
C. 443
D. 80
What is a benefit of implementing URL filtering on the Cisco ESA?
A. removes threats from malicious URLs
B. blacklists spam
C. provides URL reputation protection
D. enhances reputation against malicious URLs
Which global setting is configured under Cisco ESA Scan Behavior?
A. minimum attachment size to scan
B. attachment scanning timeout
C. actions for unscannable messages due to attachment type
D. minimum depth of attachment recursion to scan
An organization wants to use its existing Cisco ESA to host a new domain and enforce a separate corporate policy for that domain. What should be done on the Cisco ESA to achieve this?
A. Use the smtproutes command to configure a SMTP route for the new domain.
B. Use the deliveryconfig command to configure mail delivery for the new domain.
C. Use the dsestconf command to add a separate destination for the new domain.
D. Use the altrchost command to add a separate gateway for the new domain.
The Cisco ESA is processing many messages that are sent to invalid recipients. To reduce this excessive processing, an engineer is preparing to use LDAP for recipient verification. Which two steps are required to accomplish this task? (Choose two.)
A. Configure LDAP server profiles.
B. Enable external LDAP authentication.
C. Configure the LDAP query.
D. Enable LDAP authentication on a listener.
E. Configure incoming mail policy to query LDAP server.
A Cisco ESA administrator must provide outbound email authenticity and configures a DKIM signing profile to handle this task. What is the next step to allow this organization to use DKIM for their outbound email?
A. Configure the Trusted Sender Group message authenticity policy.
B. Export the DNS TXT record to provide to the DNS registrar.
C. Import the DNS record of the service provider into the Cisco ESA.
D. Enable the DKIM service checker.
A company security policy requires that the finance department have an easy way to apply encryption to their outbound messages that contain sensitive data. Users must be able to flag the messages that require encryption versus a Cisco ESA scanning all messages and automatically encrypting via detection. Which action enables this capability?
A. Create an outgoing content filter with no conditions and with the Encrypt and Deliver Now action configured with [SECURE] in the Subject setting.
B. Create a DLP policy manager message action with encryption enabled and apply it to active DLP policies for outgoing mail.
C. Create an encryption profile with [SECURE] in the Subject setting and enable encryption on the mail flow policy.
D. Create an encryption profile and an outgoing content filter that includes \[SECURE\] within the Subject Header: Contains condition along with the Encrypt and Deliver Now action.