Lesson 12 Flashcards

(32 cards)

1
Q

Protection technology

Anti-malware, security permissions, local firewall

A

Security requirements

AD DS
Internal client
External Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protection technology

Anti-malware, anti-spam, security permissions, local firewall

A

Security requirements

Exchange Server 2013

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Protection technology

Firewall, reverse proxy, SMTP Gateway, anti-malware, anti-spam

A

Security requirements

Perimeter network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

To provide secure client access from the Internet:

Protect
Implement
Implement
Create
Enable
Require
Require
Enforce
Consider
A

Protect Client Access server with a firewall

Implement an application layer firewall or reverse proxy

Implement a VPN solution

Create and configure a server certificate

Enable only required client access methods

Require secure authentication

Require SSL for all virtual directories

Enforce remote client security

Consider installing antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Restrictions to message flow can include:
___________ For example, you can configure some distribution groups in your organizations to receive email only from authenticated users
.

A

Message delivery restrictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Restrictions to message flow can include:
____________For example, you can set restrictions on which users can send email to each other and on message flow based on message
contents.

A

Transport rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Restrictions to message flow can include:
____________. You can assign moderators permissions to review all messages that are sent to the recipient object by either changing the distribution group properties or creating a transport rule.

A

Message moderation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Restrictions to message flow can include:

____________. Used to detect content that is not compliant with organizational security and compliance policies.

A
Data
Loss Prevention (DLP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Anti-virus solutions for Exchange Server2013 include:

Use the built-in anti-malware features. Configured by default
on the ___________ role.

Use a hosted, ______ solution or ________ solution.

Use a third-party corporate _________ solution.

Deploy an anti-virus solution in the ___________. Many
organizations deploy a___________ solution that also has anti-virus and anti-spam software installed. This could also include an ________ role.

A

Mailbox server
cloud-based, hybrid
anti-virus
perimeter network, SMTP gateway, Edge server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Anti-malware on mailbox servers

Recall that _____ servers in Exchange 2013 act as a stateless proxy for all inbound and outbound external SMTP traffic, a ____ does not inspect message content and does not queue any messages locally.

On the other hand, the _______ service, which runs on all
_______ servers, is almost identical to the ________ server role in previous versions of Exchange. It handles SMTP mail flow for the organization, performs message categorization, content inspection and does queue messages locally.

For these reasons,anti-malware (and anti-spam) agents in Exchange 2013 run on ____ servers.

A

CAS, CAS
Hub Transport, Mailbox, Hub Transport
Mailbox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Exchange anti-malware protection features in a Mailbox role include:

Options for ___, ___, or, ____

Download ___ and ___ updates

Scanning is performed during ____ or ____ , but not for messages that are already _________.

A

Enable, disable, or bypass
engine and definition
send or receive. held in storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Actions when malware is detected:

Delete ____________

Delete all __________ and use ______ alert text

Delete all ________ and use _________ alert text

Notify the _______ and the ___________

A

entire message
attachments, default
attachments. custom
administrator, sender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When you implement an antivirus solution, you should:

Implement multiple layers of antivirus such as:

Exchange on ____________
Exchange Online _____________
Antivirus installed on ________ or ______
Antivirus installed on the ______________

A

premise anti-malware protection
Protection
firewall or SMTP gateway server
client computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When you implement an antivirus solution, you should:

Maintain regular ___________
Regularly monitor ________________
Regularly read about ____________

A

antivirus updates
anti-malware reports
latest Internet security threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SPAM-FILTERING FEATURES IN EXCHANGE EDGE ROLE 12

Feature: Connection Filtering

Filters messages based on: ______

Feature: Sender Filtering

Filters messages based on: ______

A

The IP address of the sending SMTP server

The Sender in the MAIL FROM: SMTP header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SPAM-FILTERING FEATURES IN EXCHANGE EDGE ROLE 12

Feature: Recipient Filtering

Filters messages based on: ______

Feature: Sender ID

Filters messages based on: ______

A

The Recipients in the RCPT TO: SMTP header

The IP address of the sending server from which the message was received

17
Q

SPAM-FILTERING FEATURES IN EXCHANGE EDGE ROLE 12

Feature: Content Filtering

Filters messages based on: ______

Feature: Sender Reputation

Filters messages based on: ______

Feature: Attachment Filtering

Filters messages based on: ______

A

The message contents

Several characteristics of the sender, accumulated over a period of time

Attachment file name, file name extension, or file MIME content type

18
Q

CONNECTION FILTERING-1

When the SMTP session is initiated, the Edge Transport server
applies connection filtering using the following criteria:

Connection filtering examines the ___ ___ list.

If an IP address is on the _____, the server does not ______________ and _____ the message.

A

administrator-defined IP Allow

IP Allow list, apply any other filtering, accepts

19
Q

CONNECTION FILTERING-2

Next, connection filtering examines the local _____________

If the connection filtering agent finds the IP address of an offending server on the local ______, the server ______, and other filters are _____.

Connection filtering then examines the ________ of any _______ Providers (eg,spamhaus) that you have configured. If the agent finds the sending server’s IP address on an ___, the server ______, and other filters are _____.

A

IP Block list
IP Block list, rejects the message automatically, not applied

real-time block list (RBL), IP Block List, RBL, rejects the message, not applied.

20
Q

HOW EXCHANGE APPLIES SPAM FILTERS

Next, the Edge Transport server compares the sender’s email address with the list of senders configured in ___________. If the SMTP address is a blocked recipient or domain, the server rejects the connection, and no other filters are applied

A

sender filtering

21
Q

HOW EXCHANGE APPLIES SPAM FILTERS

The Edge Transport server then examines the recipient against the Recipient Block list configured in ___________. If the intended recipient matches a filtered email address, the Edge Transport server rejects the message for that particular recipient.

A

recipient filtering

22
Q

The _______ is an industry standard that verifies the Internet domain from which each email message originates, based on the sender’s server IP address.

The ______ provides protection against email domain spoofing and phishing schemes.

By using the _______, email senders can register all email servers that send email from their SMTP domain, and then recipients can filter email from that domain that does not come from the specified servers.

A

Sender ID Framework

23
Q

To enable Sender ID filtering, each email sender must create a _____________
record and add it to their domain’s DNS records.

The ___ record is a single text (TXT) record in the DNS database that identifies each domain’s
email servers. SPF records can use several formats, including the following examples:

cisa.com. IN TXT “v=spf1 mx -all”

This record specifies that any server that has an MX record for the cisa.com domain can send e-mail for the domain
.

A

Sender Policy Framework (SPF)

SPF

24
Q

This record indicates that a server with the IP address 142.232.199.50 can send mail for the cisa.com domain.

A

cisa.com IN TXT “v=spf1 ip4:142.232.199.50 -all”

25
Generally, you would use the online ___________________ to create your organization’s SPF records.
Microsoft Sender ID Framework SPF Record Wizard
26
When the Edge server receives a message, the Content Filter agent evaluates the message’s content for recognizable patterns, and then assigns a rating based on the probability that the message is spam. This rating is attached to the message as an _____________, which is a value between 0 and 9. 0 indicates that the message is highly ____ to be spam 9 indicates that the message is very _____ to be spam. Default value is _ If a message’s SCL score is greater than or equal to the threshold you configure, then the Content Filter agent ___, ____, or_____
SCL (Spam Confidence Level) unlikely likely 7 rejects, silently deletes, or quarantines the message.
27
The ____________ is a number from 0 through 9 that predicts the probability that a specific sender is a spammer or otherwise malicious user - the higher the number the more likelihood of it being so. Is calculated from the following statistics: •HELO/EHLO analysis - The HELO and EHLO SMTP commands provide the domain name or IP address of the sending SMTP server •Reverse DNS lookup •Analysis of SCL ratings on messages from a particular sender •Sender open proxy test - An open proxy is a proxy server that accepts connection requests from anyone anywhere and forwards the traffic as if it originated from the local hosts.
Sender Reputation Level (SRL)
28
Sender reputation acts on messages during two phases of the SMTP session: At the ___________ command Sender reputation acts on a message only if the message was blocked or otherwise acted on by the Connection Filter agent, Sender Filter agent, Recipient Filter agent, or Sender ID agent
MAIL FROM: SMTP
29
After the __________ command • The ____________ command is given when all the actual message data is sent. At this point in the SMTP session, many of the anti-spam agents have processed the message and the statistics that sender reputation relies on are updated. Therefore, sender reputation has the data to calculate or recalculate an SRL rating for the sender.
"end of data" SMTP | end of data transfer (EOD) SMTP
30
Recall that Accepted domains define SMTP domain names for which the Exchange server will accept email and can consist of __________domains __________ domains __________ domains
Authoritative Internal relay External relay
31
______________, define SMTP domains that are external to your Exchange organization
Remote domains
32
By default, there's a single remote domain entry. The domain address space is configured as an __________. This represents all remote domains. If you don't create additional remote domain entries, all messages that are sent to all recipients in all remote domains have the same settings applied to them. .
asterisk (*)