An administrator needs to configure Cisco ESA to ensure that emails are sent and authorized by the owner of the domain. Which two steps must be performed to accomplish this task? (Choose two.)
de
Spreadsheets containing credit card numbers are being allowed to bypass the Cisco ESA.
Which outgoing mail policy feature should be configured to catch this content before it leaves the network?
b
Which feature must be activated on a Cisco ESA to combat backscatter?
d
An administrator identifies that, over the past week, the Cisco ESA is receiving many emails from certain senders and domains which are being consistently quarantined. The administrator wants to ensure that these senders and domain are unable to send anymore emails.
Which feature on Cisco ESA should be used to achieve this?
a
Which two components must be configured to perform DLP scanning? (Choose two.)
bc
Reference:
https://www.cisco.com/c/en/us/td/docs/security/esa/esa11-1/user_guide/b_ESA_Admin_Guide_11_1/b_ESA_Admin_Guide_chapter_010001.html
Which two action types are performed by Cisco ESA message filters? (Choose two.)
ad
Reference:
https://www.cisco.com/c/en/us/td/docs/security/esa/esa11-1/user_guide/b_ESA_Admin_Guide_11_1/b_ESA_Admin_Guide_chapter_01000.html
A Cisco ESA administrator has several mail policies configured. While testing policy match using a specific sender, the email was not matching the expected policy.
What is the reason of this?
d
Which setting affects the aggressiveness of spam detection?
b
Reference:
https://www.cisco.com/c/en/us/support/docs/security/email-security-appliance/118220-technote-esa-00.html
An engineer is reviewing the SMTP routing table on a Cisco ESA using the smtproutes CLI command and discovers an IPv6 route for 2620:104:4360:9232::23. What type of IPv6 route does this represent?
c
An organization has a strict policy on URLs embedded in emails. The policy allows visibility into what the URL is but does not allow the user to click it. Which action must be taken to meet the requirements of the security policy?
d