Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 300-720 Topic 16 Question 85 Discussion

Actual exam question for Cisco's 300-720 exam
Question #: 85
Topic #: 16
[All 300-720 Questions]

What is the default HTTPS port when configuring spam quarantine on Cisco ESA?

Show Suggested Answer Hide Answer
Suggested Answer: C

According to the [Cisco Secure Email User Guide], Non-Viral threat detection is a feature of Outbreak Filters that detects and blocks email messages that contain non-viral threats such as phishing, fraud, or social engineering[1, p. 25]. To use this feature, you need to enable either AntiSpam or Intelligent Multi-Scan on your Cisco Secure Email Gateway, as these features provide the necessary scanning and filtering capabilities for Non-Viral threat detection[1, p. 26].

The other options are not valid because:

A) Non-Viral threat detection does not require Antivirus or AMP enablement to properly function. Antivirus and AMP are features that detect and block email messages that contain viral threats such as malware or ransomware[1, p. 27-28].

B) The Outbreak Filters option Graymail Header does not affect Non-Viral threat detection. Graymail Header is an option that allows you to add a header to email messages that are classified as graymail, which are messages that are not spam but may be unwanted by some recipients, such as newsletters or promotions[1, p. 25].

D) The Outbreak Filters option URL Rewriting does not affect Non-Viral threat detection. URL Rewriting is an option that allows you to rewrite the URLs in email messages to point to a Cisco proxy server, which can scan the URLs for malicious content and redirect the users to a warning page if needed[1, p. 25].


Contribute your Thoughts:

Cyndy
2 months ago
Wait, did they say 'default HTTPS port'? That's gotta be 443, right? C is the only logical choice here.
upvoted 0 times
Kenneth
12 days ago
I agree, C is the correct choice for the default HTTPS port.
upvoted 0 times
...
Jettie
17 days ago
Yeah, 443 is definitely the default port for HTTPS.
upvoted 0 times
...
Floyd
1 months ago
I think you're right, C is the default HTTPS port.
upvoted 0 times
...
...
Golda
2 months ago
I wonder if the dGoldalopers at Cisco have a sense of humor and made the default port 82, just to see who's paying attention. I'll go with B, just in case.
upvoted 0 times
...
Ty
2 months ago
Default ports? I thought we were supposed to use random high-numbered ports for security. Gonna have to go with D just to be different.
upvoted 0 times
Dona
11 days ago
I'm going with A) 83, just to mix things up a bit.
upvoted 0 times
...
Lorrie
20 days ago
Actually, it's B) 82, that's the default port for spam quarantine on Cisco ESA.
upvoted 0 times
...
Maricela
1 months ago
I'm pretty sure it's D) 80, that's the standard port for HTTP.
upvoted 0 times
...
Louis
2 months ago
I think it's C) 443, that's the default HTTPS port.
upvoted 0 times
...
...
Rossana
2 months ago
I'm pretty sure the Cisco ESA uses a non-standard port for spam quarantine, so I'll have to go with B.
upvoted 0 times
Rolf
1 months ago
No, I believe it's D) 80
upvoted 0 times
...
Alesia
2 months ago
I think it's C) 443
upvoted 0 times
...
...
Marnie
2 months ago
That makes sense, since 443 is the standard port for HTTPS.
upvoted 0 times
...
Darell
2 months ago
I think the default HTTPS port is 443.
upvoted 0 times
...
Lanie
2 months ago
Hmm, I remember learning about the default HTTPS port being 443, so I'll go with C.
upvoted 0 times
Tatum
15 days ago
I'll go with C too, since it seems like the most common choice.
upvoted 0 times
...
Gwenn
16 days ago
I remember reading that it's 443, so I'll pick C.
upvoted 0 times
...
Arlene
17 days ago
I'm not sure, but I'll go with C as well.
upvoted 0 times
...
Hubert
2 months ago
I think it's 443 too, so I'll choose C.
upvoted 0 times
...
...
Marnie
3 months ago
What is the default HTTPS port for spam quarantine on Cisco ESA?
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77