Topic 2: Exam Pool B
What features does Cisco FTDv provide over ASAv?
A.
Cisco FTDv runs on VMWare while ASAv does not
B.
Cisco FTDv provides 1GB of firewall throughput while Cisco ASAv does not
C.
Cisco FTDv runs on AWS while ASAv does not
D.
Cisco FTDv supports URL filtering while ASAv does not
Cisco FTDv supports URL filtering while ASAv does not
The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications
traffic. Where must the
ASA be added on the Cisco UC Manager platform?
A.
Certificate Trust List
B.
Endpoint Trust List
C.
Enterprise Proxy Service
D.
Secured Collaboration Proxy
Certificate Trust List
Refer to the exhibit.
Which type of authentication is in use?
A.
LDAP authentication for Microsoft Outlook
B.
POP3 authentication
C.
SMTP relay server authentication
D.
external user and relay mail authentication
external user and relay mail authentication
Reference: https://www.cisco.com/c/en/us/support/docs/security/email-securityappliance/
118844-technoteesa-00.htmlThe exhibit in this Qshows a successful TLS
connection from the remote host (reception) in the mail log.
A Cisco ESA administrator has been tasked with configuring the Cisco ESA to ensure there
are no viruses before quarantined emails are delivered. In addition, delivery of mail from
known bad mail servers must be prevented. Which two actions must be taken in order to
meet these requirements? (Choose two)
A.
Use outbreak filters from SenderBase
B.
Enable a message tracking service
C.
Configure a recipient access table
D.
Deploy the Cisco ESA in the DMZ
E.
Scan quarantined emails using AntiVirus signatures
Use outbreak filters from SenderBase
Scan quarantined emails using AntiVirus signatures
Reference: https://www.cisco.com/c/en/us/td/docs/security/esa/esa12-
0/user_guide/b_ESA_Admin_Guide_12_0/b_ESA_Admin_Guide_12_0_chapter_0100100.
html-> Therefore Outbreak filters can be used to block emails from bad mail servers.Web
servers and email gateways are generally located in the DMZ soNote: The recipient access
table (RAT), not to be confused with remote-access Trojan (also RAT), is a Cisco ESA term
that defines which recipients are accepted by a public listener.
Which protocol provides the strongest throughput performance when using Cisco
AnyConnect VPN?
A.
TLSv1.2
B.
TLSv1.1
C.
BJTLSv1
D.
DTLSv1
DTLSv1
DTLS is used for delay sensitive applications (voice and video)
as its UDP based while TLS is TCP based.Therefore DTLS offers strongest throughput
performance. The throughput of DTLS at the time of AnyConnect connection can be
expected to have processing performance close to VPN throughput.
Page 5 out of 126 Pages |
Previous |