Exam Preparation Tasks
Review All the Key Topics
Review the most important topics from this chapter, denoted with a Key Topic icon. Table 18-2 lists these key topics.
Table 18-2 Key Topics
Key Topic Element |
Description |
Page Number |
Section |
E-mail-Based Threats |
479 |
Section |
Cisco Cloud E-mail Security |
479 |
Section |
Cisco E-mail Security Appliance |
480 |
Section |
Mitigation Technology for Web-Based Threats |
486 |
Section |
Cisco CWS |
486 |
Section |
Cisco WSA |
487 |
Complete the Tables and Lists from Memory
Print a copy of Appendix C, “Memory Tables,” (found on the CD) or at least the section for this chapter, and complete the tables and lists from memory. Appendix D, “Memory Tables Answer Key,” also on the CD, includes completed tables and lists so that you can check your work. There are no applicable tables in this specific chapter.
Define Key Terms
Define the following key terms from this chapter, and check your answers in the glossary:
- antispam filters, network antivirus, advanced malware protection (AMP), file sandboxing, file retrospection
Command Reference to Check Your Memory
This section includes the most important configuration and EXEC commands covered in this chapter. To see how well you have memorized the commands as a side effect of your other studies, cover the left side of Table 18-3 with a piece of paper, read the descriptions on the right side, and see whether you remember the commands.
Table 18-3 Command Reference
Command |
Description |
systemsetup |
Launch the System Setup Wizard to initially configure the Cisco ESA. |
mailconfig |
Verify the Cisco ESA configuration by sending a test e-mail that contains the system configuration data that was entered in the system setup wizard. |