term1 Definition1term2 Definition2term3 Definition3
Please sign in to your Google account to access your documents:
Which of the following features does the Cisco ESA provide? (Choose all that apply.)
a. Network antivirus capabilities
b. E-mail encryption
c. Threat outbreak prevention
d. Support for remote access SSL VPN connections
.ABC
Which of the following Cisco ESA models are designed for mid-sized organizations?(Choose all that apply.)
a. Cisco C380
b. Cisco C670
c. Cisco C680
d. Cisco X1070
.AB
What is a spear phishing attack?
a. Unsolicited e-mails sent to an attacker.
b. A denial-of-service (DoS) attack against an e-mail server.
c. E-mails that are directed to specific individuals or organizations. An attacker mayobtain information about the targeted individual or organization from social mediasites and other sources.
d. Spam e-mails sent to numerous victims with the purpose of making money.
C.
Which of the following e-mail authentication mechanisms are supported by the CiscoESA? (Choose all that apply.)
a. Sender Policy Framework (SPF)
b. Sender ID Framework (SIDF)
c. DomainKeys Identified Mail (DKIM)
d. DomainKeys Mail Protection (DMP)
Which of the following is the operating system used by the Cisco WSA ?
a. Cisco AsyncOS operating system
b. Cisco IOS-XR Software
c. Cisco IOS-XE Software
d. Cisco IOS Software
e. Cisco ASA Software
.
Which of the following connectors are supported by the Cisco CWS service? (Chooseall that apply.)a. Cisco Security Manager (CSM)
b. Cisco ASA
c. Cisco ISR G2 routers
d. Cisco AnyConnect Secure Mobility Client
e. Cisco WSA
Which of the following features are supported by the Cisco WSA? (Choose all that apply.)
a. File reputation
b. File sandboxing
c. Layer 4 traffic monitor
d. Real-time e-mail scanning
e. Third-party DLP integration
Cisco WSA can be deployed using the Web Cache Communication Protocol (WCCP)configured in which of the following modes? (Choose all that apply.)
a. Multiple context mode
b. Explicit proxy mode
c. Transparent proxy mode
d. Virtualized mode
What are the common email based threats?
Spam, malware attachments, phishing, spear fishing
How does Cisco Cloud E-mail Security work?
Companies can outsource management of email security. provides email security in high availability
Need help typing ? See our FAQ (opens in new window)
Please sign in to create this set. We'll bring you back here when you are done.
Discard Changes Sign in
Please sign in to add to folders.
Sign in
Don't have an account? Sign Up »
You have created 2 folders. Please upgrade to Cram Premium to create hundreds of folders!