Mitigation Technologies for E-mail-Based and Web-Based Threats Flashcards
What three features does the Cisco ESA provide?
Network antivirus capabilities, E-mail encryption, Threat outbreak prevention
Which Cisco ESA models are designed for mid-sized organizations?
Cisco c380, Cisco c670
What is a spear phishing attack?
E-mails that are directed to specific individuals or organizations. An attacker may obtain information about the targeted individual organization from social media sites and other sources.
Name three e-mail authentication mechanisms that are supported by the Cisco ESA?
Sender Policy Framework (SPF), Sender ID Framework (SIDF), DomainKeys Identified Mail
What operating system is used by the Cisco WSA?
Cisco AsyncOS operating system
What connectors are supported by the Cisco CWS services?
Cisco ASA, Cisco ISR G2 router, Cisco Anyconnect Secure Mobility Client, Cisco WSA
What features are supported by the Cisco WSA?
File reputation, File sandboxing, Layer 4 traffic monitor, Thrid-party DLP integration
Cisco WSA can be deployed using the WCCP configured in which of the following modes?
Explicit proxy mode, Transparent proxy mode