A system administrator wants to know if the email traffic from a remote partner will activate special treatment message filters that are created just for them. Which tool on the Cisco Email Security gateway can you use to debug and emulate the flow that a message takes through the work queue?
Answer : A
In which two places can thresholding settings be configured? (Choose two.)
Answer : AD
Which cloud-based malware detection engine uses machine-learning detection techniques in the Cisco Advanced Malware Protection cloud?
Answer : B
Which Cisco FirePOWER setting is used to reduce the number of events received in a period of time and avoid being overwhelmed?
Answer : A
Answer : E
Explanation:
Here we see that the TRUSTED policy is being throttled to 5000 recipients per message.
Answer : C
Explanation:
From the instructions we know that the green.public domain has been assigned a reputation score of 2. From below we know that a reputation score of 2 belongs to the SUSPECTLIST, which has a policy of "THROTTLED":
Answer : D
Explanation:
From the instructions we know that the reputation score for the violet.public domain has been set to 8. From the HAT table shown below we know that a score of
8 belongs to the UNKNOWNLIST group, which is assigned the ACCEPTED policy.
Answer : G
Explanation:
The BLOCKED policy rejects messages as shown below:
Answer : A
Explanation:
We can see from the output that the number of routers (ASA"™s) is 1, so there is a single ASA or an active/ standby pair being used, and 1 Cache Engine. If the
ASA"™s were in an active/active role it would show up as 2 routers.
Answer : B
Explanation:
From the screen shot below we see the WCCP-Redirection ACL is applied, so all traffic from the Private IP space to any destination will be redirected.
Answer : C
Explanation:
This can be seen from the WSA Network tab shown below:
Answer : B
Explanation:
WCCP version shows as version 2.0:
When you create a new server profile on the Cisco ESA, which subcommand of the ldapconfig command configures spam quarantine end-user authentication?
Answer : D
What is a value that Cisco ESA can use for tracing mail flow?
Answer : D
Which option is a benefit of Cisco Email Security virtual appliance over the Cisco ESA appliance?
Answer : B
Have any questions or issues ? Please dont hesitate to contact us