• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/14

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

14 Cards in this Set

  • Front
  • Back

Which of the following features does the Cisco ESA provide? (Choose all that apply.)


a. Network antivirus capabilities


b. E-mail encryption


c. Threat outbreak prevention


d. Support for remote access SSL VPN connections

.ABC

Which of the following Cisco ESA models are designed for mid-sized organizations?(Choose all that apply.)


a. Cisco C380


b. Cisco C670


c. Cisco C680


d. Cisco X1070

.AB

What is a spear phishing attack?


a. Unsolicited e-mails sent to an attacker.


b. A denial-of-service (DoS) attack against an e-mail server.


c. E-mails that are directed to specific individuals or organizations. An attacker mayobtain information about the targeted individual or organization from social mediasites and other sources.


d. Spam e-mails sent to numerous victims with the purpose of making money.

C.

Which of the following e-mail authentication mechanisms are supported by the CiscoESA? (Choose all that apply.)


a. Sender Policy Framework (SPF)


b. Sender ID Framework (SIDF)


c. DomainKeys Identified Mail (DKIM)


d. DomainKeys Mail Protection (DMP)

.ABC

Which of the following is the operating system used by the Cisco WSA ?


a. Cisco AsyncOS operating system


b. Cisco IOS-XR Software


c. Cisco IOS-XE Software


d. Cisco IOS Software


e. Cisco ASA Software

.

Which of the following connectors are supported by the Cisco CWS service? (Chooseall that apply.)a. Cisco Security Manager (CSM)


b. Cisco ASA


c. Cisco ISR G2 routers


d. Cisco AnyConnect Secure Mobility Client


e. Cisco WSA

.

Which of the following features are supported by the Cisco WSA? (Choose all that apply.)


a. File reputation


b. File sandboxing


c. Layer 4 traffic monitor


d. Real-time e-mail scanning


e. Third-party DLP integration

.

Cisco WSA can be deployed using the Web Cache Communication Protocol (WCCP)configured in which of the following modes? (Choose all that apply.)


a. Multiple context mode


b. Explicit proxy mode


c. Transparent proxy mode


d. Virtualized mode

.

What are the common email based threats?

Spam, malware attachments, phishing, spear fishing

How does Cisco Cloud E-mail Security work?

Companies can outsource management of email security. provides email security in high availability

List the email security appliances and their role

X1070 - service providers


C680 - service providers




C670, C380 - medium businesses




C370, C170 - small businesses

Supported features of Cisco AsyncOS are:

Access control, Antispam, Network Antivirus, AMP, Email encryption, email authentication



What email authentication methods are supported?

A few e-mail authentication mechanisms are supported, includingSender Policy Framework (SPF), Sender ID Framework (SIDF), and DomainKeysIdentified Mail (DKIM) verification of incoming mail, as well as DomainKeys and DKIMsigning of outgoing mail.

What is Cisco CWS

Cisco Cloud Web Security provides worldwide threat intelligence. Cisco customers can connect to the Cisco CWS service directly byusing a proxy autoconfiguration (PAC) file in the user endpoint or through connectors integratedinto the following Cisco products:


■ Cisco ISR G2 routers


■ Cisco ASA


■ Cisco WSA


■ Cisco AnyConnect Secure Mobility Client