Email & Web Solutions
Quick summary Cisco Email Security includes advanced threat protection capabilities to detect, block, and remediate threats faster; prevent data loss; and secure important information in transit with end-to-end encryption. With Cisco Email Security customers can: |
Question 1
Explanation
Protect sensitive content in outgoing emails with Data Loss Prevention (DLP) and easy-to-use email encryption, all in one solution.
Cisco Email Security appliance can now handle incoming mail connections and incoming messages from specific geolocations and perform appropriate actions on them, for example:
– Prevent email threats coming from specific geographic regions.
– Allow or disallow emails coming from specific geographic regions.
Question 2
Question 3
Question 4
Question 5
Question 6
Question 7
Question 8
Explanation
Cisco Hybrid Email Security is a unique service offering that combines a cloud-based email security deployment with an appliance-based email security deployment (on premises) to provide maximum choice and control for your organization. The cloud-based infrastructure is typically used for inbound email cleansing, while the on-premises appliances provide granular control – protecting sensitive information with data loss prevention (DLP) and encryption technologies.
Question 9
Explanation
Talos’ IP and Domain Data Center is the world’s most comprehensive real-time threat detection network. The data is made up of daily security intelligence across millions of deployed web, email, firewall and IPS appliances. Talos detects and correlates threats in real time using the largest threat detection network in the world spanning web requests, emails, malware samples, open-source data sets, endpoint intelligence, and network intrusions. The Email and Web Traffic Reputation Center is able to transform some of Talos’ data into actionable threat intelligence and tools to improve your security posture.
Question 10
Explanation
There are two possible methods to accomplish the redirection of traffic to Cisco WSA: transparent proxy mode and explicit proxy mode.
In a transparent proxy deployment, a WCCP v2-capable network device redirects all TCP traffic with a destination of port 80 or 443 to Cisco WSA, without any configuration on the client. The transparent proxy deployment is used in this design, and the Cisco ASA firewall is used to redirect traffic to the appliance because all of the outbound web traffic passes through the device and is generally managed by the same operations staff who manage Cisco WSA.
Question 11
Explanation
Message tracking helps resolve help desk calls by giving a detailed view of message flow. For example, if a message was not delivered as expected, you can determine if it was found to contain a virus or placed in a spam quarantine — or if it is located somewhere else in the mail stream.
Question 12
Explanation
Cisco Hybrid Secure Email is a unique service offering that combines a cloud-based email security deployment with an appliance-based email security deployment (on premises) to provide maximum choice and control for your organization. The cloud-based infrastructure is typically used for inbound email cleansing, while the on-premises appliances provide granular control – protecting sensitive information with data loss prevention (DLP) and encryption technologies.
Question 13
Explanation
Cisco Email Security Appliance (ESA) protects the email infrastructure and employees who use email at work by filtering unsolicited and malicious email before it reaches the user. Cisco ESA easily integrates into existing email infrastructures with a high degree of flexibility. It does this by acting as a Mail Transfer Agent (MTA) within the email-delivery chain. Another name for an MTA is a mail relay.
Question 14
Question 15
Question 15 should be: B, E. pls advise
please ……………………where can i get these questions
Q15: answer is BE, PBR and WCCP
Q15 correct is BE.
Transparent mode: WCCP, PBR or L4-7 redirection.
Explicit forward mode: Browser config or PAC file.
In which two ways does a system administrator send web traffic transparently to the Web Security Appliance? (Choose two)
A. configure Active Directory Group Policies to push proxy settings
B. configure policy-based routing on the network infrastructure
C. reference a Proxy Auto Config file
D. configure the proxy IP address in the web-browser settings
E. use Web Cache Communication Protocol
Answer: C E
are these answers correct? “reference a Proxy Auto Config file” is for Explicit mode right?
any suggestions please..
In an explicit proxy configuration, the client (browser) is explicitly configured to use a proxy server, meaning the browser knows that all requests will go through a proxy. The browser is given the IP address and port number of the proxy service (the ProxySG). You could also use a Proxy Auto-Configuration (PAC) file to configure the browser to download the proxy settings from a Web server. When a user makes a request, the browser connects to the proxy service and sends the request. The disadvantage to explicit proxy is that each desktop must be properly configured to use the proxy, which might not be feasible in a large organization.
Transparent Proxy works via WCCP (Web Cache Coordination Protocol) on Cisco ASA.
Q15 correct is BE.
For question 15 I think people are getting confused by Cisco wording tricks. The question doesn’t actually say anything about transparent mode. It says “two ways does a system administrator send web traffic transparently”. It is transparent to the end user if you use WCCP or a PAC file.
Is anyone confident on the answers here? Seems to be uncertainty all over the place on this question. I thought C and E seemed correct.
q15 BE
can anyone please suggest which is right answer for Q 15 C,E or B,E?
Q15:
I am going to go with B and E.
If it was “transparent to the user to use a PAC file” than the answers would be B,C,D,E because a user could just check the web proxy settings and see that the PAC file added a proxy server to the browser settings.
WCCP and PBR do give any indication to the user that the proxy server is being used. That is the answer I am going to pick when I take the test.
Best of luck to everyone.
Q12 why not C? Both of C or D seem to be right for me:
Cisco Hybrid Email Security gives you the benefits of Cloud Email Security and provides advanced outbound control of encrypting messages and onsite DLP. This hybrid solution lets you transition to a cloud solution at your own pace.
Ref: https://www.cisco.com/c/en/us/products/collateral/security/email-security-appliance/data-sheet-c78-729751.html
Q15 agree with B,E.
In B and E the user could never figure in his/her web client that a proxy is configured. In A,C,D something is configured in the browser (proxy IP address or PAC File).
Q15, agree on B and E.
User could not figure that a proxy is being used in his/her web browser with options B and E.
But on A,C,D something is configured in the web browser (proxy IP address or PAC File), and end user can check it.
@all: Thanks for your information, we have just updated Q.15.
Cannot be C or D because those are not transparent to the user.
@Securitytut
Question 12
What is the primary benefit of deploying an ESA in hybrid mode?
A. You can fine-tune its settings to provide the optimum balance between security and performance for your environment
B. It provides the lowest total cost of ownership by reducing the need for physical appliances
C. It provides maximum protection and control of outbound messages
D. It provides email security while supporting the transition to the cloud
The correct answer should be – C.
-Maximum protection by cleansing the messages in the Cloud and Control of outbound messages by DLP and Encryption.
=========Cisco Hybrid Secure Email Overview==========
Cisco Hybrid Secure Email is a unique service offering that combines a cloud-based email security
deployment with an appliance-based email security deployment (on premises) to provide maximum
choice and control for your organization. The cloud-based infrastructure is typically used for inbound
email cleansing, while the on-premises appliances provide granular control—protecting sensitive
information with data loss prevention (DLP) and encryption technologies.
https://www.cisco.com/c/dam/en/us/td/docs/security/ces/overview_guide/Cisco_Cloud_Hybrid_Email_Security_Overview_Guide.pdf
@Jay: Thank you for your information, we updated Q12!
Thank you :)
Sophos engine? Isn’t it a separate security product?