Cisco 700-280 - Email Security for Field Engineers Exam
Page: 2 / 13
Total 64 questions
Question #6 (Topic: )
Which option correctly describes the encryption technologies that should be used with "TLS
Preferred" Guaranteed Secure Delivery?
Preferred" Guaranteed Secure Delivery?
A. Try to use TLS. If it fails, use envelope encryption.
B. Try envelope encryption first. If it fails, use TLS.
C. Always use envelope encryption.
D. Always use TLS. If TLS fails, bounce the message.
Answer: A
Question #7 (Topic: )
Refer to the exhibit. Based on the Add Condition menu which of listed file attachments will
be matched? (Choose two.)
be matched? (Choose two.)
A. A .msi attachment that has had its file extension changed to .pdf
B. A .pdf attachment that has had its file extension changed to .exe.
C. A.pdf attachment
D. A .exe attachment.
Answer: B,D
Question #8 (Topic: )
While running the system setup wizard, what are the default settings for Senderbase
Network Participation and Auto Support?
Network Participation and Auto Support?
A. SBNP: onAuto Support: on
B. SBNP: onAuto Support: off
C. SBNP: offAuto Support: off
D. SBNP: offAuto Support: on
Answer: A
Question #9 (Topic: )
At what point in the SMTP conversation can the SMTP client send message headers?
A. Between RCPTTO and DATA
B. Between HELO and MAIL FROM
C. Between DATA and a period"." on a single line
D. Between MAIL FROM and RCPTTO
Answer: C
Question #10 (Topic: )
What is the best solution to prevent directory harvest attacks?
A. Create an access list as a content dictionary and match this resource, with a content filter, against incoming emails.
B. Specify all of the legitimate mailbox addresses in the RAT.
C. Enable LDAP Accept.
D. Create an access list as a content dictionary and match this resource, with a message filter, against incoming emails
Answer: C