Question 11
Which two query types are available when an LDAP profile is configured? (Choose two.)
Question 12
An analyst creates a new content dictionary to use with Forged Email Detection.
Which entry will be added into the dictionary?
Question 13
Which two statements about configuring message filters within the Cisco ESA are true? (Choose two.)
Question 14
Email encryption is configured on a Cisco ESA that uses CRES.
Which action is taken on a message when CRES is unavailable?
Question 15
Which attack is mitigated by using Bounce Verification?
