What is the access-list command on a Cisco IPS appliance used for?
What is the access-list command on a Cisco IPS appliance used for?
How does a user access a Cisco Web Security Appliance for initial setup?
How does a user access a Cisco Web Security Appliance for initial setup?
What command alters the SSL ciphers used by the Cisco Email Security Appliance for TLS sessions and HTTPS acce
What command alters the SSL ciphers used by the Cisco Email Security Appliance for TLS sessions and
HTTPS access?
Which four steps should Joe implement to accomplish this goal?
Joe was asked to secure access to the Cisco Web Security Appliance to prevent unauthorized access.
Which four steps should Joe implement to accomplish this goal? (Choose four.)
Which command is used to enable strong ciphers on the Cisco Web Security Appliance?
Which command is used to enable strong ciphers on the Cisco Web Security Appliance?
Which Cisco ESA command is used to edit the ciphers that are used for GUI access?
Which Cisco ESA command is used to edit the ciphers that are used for GUI access?
which two steps must be performed?
In order to set up HTTPS decryption on the Cisco Web Security Appliance, which two steps must be
performed? (Choose two.)
which four settings are inherited?
When a Cisco Email Security Appliance joins a cluster, which four settings are inherited? (Choose four.)
Which feature of the Cisco Email Security Appliance provides this record?
The helpdesk was asked to provide a record of delivery for an important email message that a customer
claims it did not receive. Which feature of the Cisco Email Security Appliance provides this record?
Which two features must be enabled in order to record those connections in the mail log on the Cisco ESA?
Connections are being denied because of SenderBase Reputation Scores. Which two features must be
enabled in order to record those connections in the mail log on the Cisco ESA? (Choose two.)