In which two areas can host groups be used?
In which two areas can host groups be used? (Select two.) A. Locations B. Download Insight C. IPS D. Application and Device Control E. Firewall
Which action should the administrator take to correct the problem with minimal impact to the existing environm
After several failed logon attempts, the Symantec Endpoint Protection Manager (SEPM) has locked the default admin account. An administrator needs to make system changes as soon as possible to address an outbreak, but the admin account is the only account. Which action should the administrator take to correct the problem with minimal impact to the […]
What is the importance of selecting the appropriate content type, when creating a list for Data Protection pol
What is the importance of selecting the appropriate content type, when creating a list for Data Protection policy? A. The content type determines the condition the list resides in. B. The content type determines whether the list can be used for Policy Based Encryption. C. The content type determines how often a list can be […]
How long are emails identified as spam kept in an end user’s quarantine?
How long are emails identified as spam kept in an end user’s quarantine? A. 14 days B. 5 days C. 30 days D. 7 days Reference: http://images.messagelabs.com/EmailResources/ServiceAdminGuides/EmailQuarantineUserGuide.pdf
What does Domain Keys Identified Mail (DKIM) use to verify that an email message was sent from an authorized m
What does Domain Keys Identified Mail (DKIM) use to verify that an email message was sent from an authorized mail server? A. Public Key Cryptography B. Sender Policy Framework C. Private Key Cryptography D. Domain Name Service Reference: https://help.symantec.com/cs/SMG_10_6_6/SMG/v5748156_v125807409/Sender-Authenticationemail_firewall_sender_authentication?locale=EN_US
Which process is acceptable for validating domain ownership within the “Add New Domain” wizard?
Which process is acceptable for validating domain ownership within the “Add New Domain” wizard? A. Text message validation B. DNS Validation with an added TXT Record C. Email Security.cloud support ticket D. DNS Validation with an added SPF Record Reference: https://docplayer.net/22114006-Deployment-document-for-office-365-and-symantec-cloud-v1-0.html (20)
Why should an administrator configure Symantec Validation & ID Protection (VIP) with ClientNet?
Why should an administrator configure Symantec Validation & ID Protection (VIP) with ClientNet? A. To enable Data Protection Policies B. To enable Policy Based Encryption C. To enable Transport Layer Security D. To enable Two Factor Authentication Reference: https://help.symantec.com/cs/EMAIL_WEB.CLOUD/CLOUDPORTAL/v97248373_v116856119/Informazioni-sul-controllo-dell?locale=EN_US
What is the Service Level Agreement (SLA) for Email Security.cloud Service Availability?
What is the Service Level Agreement (SLA) for Email Security.cloud Service Availability? A. 95% B. 99.999% C. 100% D. 99% Reference: https://www.pugh.co.uk/wp-content/uploads/2017/08/Symantec-Email-Security.cloud_.pdf
Which type of Mail Transfer Agent is required for automated group synchronization?
Which type of Mail Transfer Agent is required for automated group synchronization? A. Domino B. Exchange C. Postix D. Google Apps
When does Real Time Link Following scan a webpage for malware?
When does Real Time Link Following scan a webpage for malware? A. After the Web Proxy has intercepted the web request B. After an email with a URL link is delivered to the end user C. After an email with a URL link is clicked the end user D. Before an email with a URL […]