Free 350-701 Exam Braindumps (page: 44)

Page 44 of 153

Refer to the exhibit.



Which type of authentication is in use?

  1. LDAP authentication for Microsoft Outlook
  2. POP3 authentication
  3. SMTP relay server authentication
  4. external user and relay mail authentication

Answer(s): A

Explanation:

The TLS connections are recorded in the mail logs, along with other significant actions that are related to messages, such as filter actions, anti-virus and anti-spam verdicts, and delivery attempts. If there is a successful TLS connection, there will be a TLS success entry in the mail logs. Likewise, a failed TLS connection produces a TLS failed entry. If a message does not have an associated TLS entry in the log file, that message was not delivered over a TLS connection.


Reference:

https://www.cisco.com/c/en/us/support/docs/security/email-security-appliance/118844- technoteesa-00.html
The exhibit in this Qshows a successful TLS connection from the remote host (reception) in the mail log.



An organization received a large amount of SPAM messages over a short time period. In order to take action on the messages, it must be determined how harmful the messages are and this needs to happen dynamically.
What must be configured to accomplish this?

  1. Configure the Cisco WSA to modify policies based on the traffic seen
  2. Configure the Cisco ESA to receive real-time updates from Talos
  3. Configure the Cisco WSA to receive real-time updates from Talos
  4. Configure the Cisco ESA to modify policies based on the traffic seen

Answer(s): D

Explanation:

The Mail Policies menu is where almost all of the controls related to email filtering happens. All the security and content filtering policies are set here, so it's likely that, as an ESA administrator, the pages on this menu are where you are likely to spend most of your time.



Which product allows Cisco FMC to push security intelligence observable to its sensors from other products?

  1. Encrypted Traffic Analytics
  2. Threat Intelligence Director
  3. Cognitive Threat Analytics
  4. Cisco Talos Intelligence

Answer(s): B



What are two differences between a Cisco WSA that is running in transparent mode and one running in explicit mode? (Choose two)

  1. The Cisco WSA responds with its own IP address only if it is running in explicit mode.
  2. The Cisco WSA is configured in a web browser only if it is running in transparent mode.
  3. The Cisco WSA responds with its own IP address only if it is running in transparent mode.
  4. The Cisco WSA uses a Layer 3 device to redirect traffic only if it is running in transparent mode.

  5. When the Cisco WSA is running in transparent mode, it uses the WSA's own IP address as the HTTP request destination.

Answer(s): A,D

Explanation:

In explicit proxy mode, users are configured to use a web proxy and the web traffic is sent directly to the Cisco WSA. In contrast, in transparent proxy mode the Cisco WSA intercepts user's web traffic redirected from other network devices, such as switches, routers, or firewalls.



Page 44 of 153



Post your Comments and Discuss Cisco® 350-701 exam with other Community members:

David A commented on January 16, 2024
Good Colombia
Anonymous
upvote

Kim commented on May 25, 2023
I just purchased and downloaded my files. Everything looks good so far.
UNITED STATES
upvote