
Refer to the exhibit. What is the correct order of c ommands to set filter 2 to active?
Which predefined DLP category must be used by a network administrator to ensure that a company employee cannot send credit card information outside the company?
Which content filter condition checks to see if the " From: header " in the message is similar to any of the users in the content dictionary?
Which feature must be configured before an administrator can use the outbreak filter for nonviral threats?
Which functionality is impacted if the assigned certificate under one of the IP interfaces is modified?
Which feature must be activated on a Cisco Secure Email Gateway to combat backscatter?
What is the purpose of checking the CRL during SMTP authentication on a Cisco Secure Email Gateway?
Which suboption must be selected when LDAP is configured for Spam Quarantine End-User Authentication?
Which scenario prevents a message from being sent to the quarantine as an action in the scan behavior on Cisco ESA?
A Cisco ESA administrator has several mail policies configured. While testing policy match using a specific sender, the email was not matching the expected policy.
What is the reason of this?
A network administrator enabled McAfee antivirus scanning on a Cisco Secure Email Gateway and configured the virus scanning action of " scan for viruses only " If the scanner finds a virus in an attachment for an incoming email, what action will be applied to this message?
An engineer must configure Directory Harvest Attack Prevention for SMTP in Cisco Secure Email Gateway. This error message must be sent when the listener receives more than 50 invalid
recipients per hour.
•500 - Too many requests
•Max. Invalid Recipients Per Hour was set to 50 already.
Which two actions must be taken next to set maximum invalid recipients per hour to meet the requirement? (Choose two.)
An engineer tries to implement phishing simulations to test end users, but they are being blocked by the Cisco Secure Email Gateway appliance. Which two components, when added to the allow list, allow these simulations to bypass antispam scanning? (Choose two.)
An engineer tries to implement phishing simulations to test end users, but they are being blocked by the Cisco Secure Email Gateway appliance. Which two components, when added to the allow list, allow these simulations to bypass antispam scanning? (Choose two.)
What is the function of authenticating SMTP sessions using client certificates?

Refer to the exhibit. A security engineer must configure a Cisco Secure Email Gateway to ensure that encryption is enabled and the configured profile is provisioned. Which command must be used?
Which two configurations are used on multiple LDAP servers to connect with Cisco ESA? (Choose two.)
Which components are required when encrypting SMTP with TLS on a Cisco Secure Email Gateway appliance when the sender requires TLS verification?
A network administrator notices that there are a high number of queries to the LDAP server. The mail logs show an entry “550 Too many invalid recipients | Connection closed by foreign host.”
Which feature must be used to address this?
Which two factors must be considered when message filter processing is configured? (Choose two.)
An engineer must configure a mail policy for all incoming email that contains a Microsoft Excel attachment. All such email must be quarantined without any exception. After the incoming mail policy is created, which action must be taken next to meet the requirement?
Refer to the exhibit.


Which configuration allows the Cisco Secure Email Gateway to scan for executables inside the archive file and apply the action as per the content filter?
An admin istrator is managing multiple Cisco ESA devices and wants to view the quarantine emails from all devices in a central location.
How is this accomplished?
Which two action types are performed by Cisco ESA message filters? (Choose two.)
A company ' s CFO is requesting the email administrator create an exception for graymail from a certain yoga studio ' s weekly newsletter. Which category of graymail does this fall under?
A security engineer wants to ensure that legitimate emails from info@partners.com are not quarantined as spam in Cisco Secure Email. Which action must be taken to meet this requirement?
An engineer is testing mail flow on a new Cisco ESA and notices that messages for domain abc.com are stuck in the delivery queue. Upon further investigation, the engineer notices that the messages pending delivery are destined for 192.168.1.11, when they should instead be routed to 192.168.1.10.
What configuration change needed to address this issue?
Drag and drop the Cisco ESA reactions to a possible DLP from the left onto the correct action types on the right.

An engineer is configuring a Cisco Secure Email Gateway and needs to reject email messages to a recipient with email address user0516585210@acme.com . Which list contains the allowed recipient addresses?
A Cisco Secure Email Gateway appliance is processing many messages that are sent to invalid recipients verification. Which two steps are required to accomplish this task? (Choose two.)
What is the maximum message size that can be configured for encryption on the Cisco ESA?
Which two actions are configured on the Cisco ESA to query LDAP servers? (Choose two.)
Which method enables an engineer to deliver a flagged messag e to a specific virtual gateway address in the most flexible way?
What must be configured to allow the Cisco ESA to encrypt an email using the Cisco Registered Envelope Service?
Drag and drop the actions from the left into the sequence on the right to configure directory harvest prevention in Cisco Secure Email Gateway.

A Cisco Secure Email Gateway administrator recently enabled the Outbreak Filters Global Service Setting to detect Viral as well as Non-Viral threat detection, with no detection of Non-viral threats after 24 hours of monitoring Outbreak Filters What is the reason that Non-Viral threat detection is not detecting any positive verdicts?
A trusted partner of an organization recently experienced a new campaign that was leveraging JavaScript attachments to trick users into executing malware. As a result, they created a local policy to deny messages with JavaScript attachments. Which action should the administrator of the organization take to ensure encrypted communications are delivered to the intended partner recipient?
A Cisco Secure Email Gateway administrator must provide outbound email authenticity and configures a DKIM signing profile to handle this task. What is the next step to allow this organization to use DKIM for their outbound email?
Which of the following two steps are required to enable Cisco SecureX integration on a Cisco Secure Email Gateway appliance? (Choose two.)
The security administrator wants to configure alerts on Cisco Secure Email Gateway for outbreak filters. Which two actions must be taken to meet the requirement? (Choose two.)
An engineer is tasked with reviewing mail logs to confirm that messages sent from domain abc.com are passing SPF verification and being accepted by the Cisco ESA. The engineer notices that SPF veri fication is not being performed and that SPF is not being referenced in the logs for messages sent from domain abc.com.
Why is the verification not working properly?
An engineer wants to utilize a digital signature in outgoing emails to validate to others that the email they are receiving was indeed sent and authorized by the owner of that domain Which two components should be configured on the Cisco Secure Email Gateway appliance to achieve this? (Choose two.)
An organization has multiple Cisco Secure Email Gateway appliances deployed, resulting in several spam quarantines to manage. To manage the quarantined messages, the administrator enabled the centralized spam quarantine on the Cisco Secure Email and Web Manager appliance and configured the external spam quarantine on the Cisco Secure Email Gateway appliances. However, messages are still being directed to the local quarantine on the Cisco Secure Email Gateway appliances What change is necessary to complete the configuration?
An email containing a URL passes through the Cisco ESA that has content filtering disabled for all mail policies. The sender is sampleuser@test1.com, the recipients are testuser1@test2.com, testuser2@test2.com, testuser3@test2.com, and mailer1@te st2.com. The subject of the email is Test Document395898847. An administrator wants to add a policy to ensure that the Cisco ESA evaluates the web reputation score before permitting this email.
Which two criteria must be used by the administrator to achie ve this? (Choose two.)
Which two statements about configuring message filters within the Cisco ESA are true? (Choose two.)


Refer to the exhibit. Which configuration on the scan behavior must be updated to allow the attachment to be scanned on the Cisco ESA?
Drag and drop the graymail descriptions from the left onto the verdict categories they belong to on the right.

An administrator identifies tha t, over the past week, the Cisco ESA is receiving many emails from certain senders and domains which are being consistently quarantined. The administrator wants to ensure that these senders and domain are unable to send anymore emails.
Which feature on Ci sco ESA should be used to achieve this?