What is the importance of selecting the appropriate content type, when creating a list for Data Protection pol
What is the importance of selecting the appropriate content type, when creating a list for Data Protection policy? A. The content type determines the condition the list resides in. B. The content type determines whether the list can be used for Policy Based Encryption. C. The content type determines how often a list can be […]
How long are emails identified as spam kept in an end user’s quarantine?
How long are emails identified as spam kept in an end user’s quarantine? A. 14 days B. 5 days C. 30 days D. 7 days Reference: http://images.messagelabs.com/EmailResources/ServiceAdminGuides/EmailQuarantineUserGuide.pdf
What does Domain Keys Identified Mail (DKIM) use to verify that an email message was sent from an authorized m
What does Domain Keys Identified Mail (DKIM) use to verify that an email message was sent from an authorized mail server? A. Public Key Cryptography B. Sender Policy Framework C. Private Key Cryptography D. Domain Name Service Reference: https://help.symantec.com/cs/SMG_10_6_6/SMG/v5748156_v125807409/Sender-Authenticationemail_firewall_sender_authentication?locale=EN_US
Which process is acceptable for validating domain ownership within the “Add New Domain” wizard?
Which process is acceptable for validating domain ownership within the “Add New Domain” wizard? A. Text message validation B. DNS Validation with an added TXT Record C. Email Security.cloud support ticket D. DNS Validation with an added SPF Record Reference: https://docplayer.net/22114006-Deployment-document-for-office-365-and-symantec-cloud-v1-0.html (20)
Why should an administrator configure Symantec Validation & ID Protection (VIP) with ClientNet?
Why should an administrator configure Symantec Validation & ID Protection (VIP) with ClientNet? A. To enable Data Protection Policies B. To enable Policy Based Encryption C. To enable Transport Layer Security D. To enable Two Factor Authentication Reference: https://help.symantec.com/cs/EMAIL_WEB.CLOUD/CLOUDPORTAL/v97248373_v116856119/Informazioni-sul-controllo-dell?locale=EN_US
What is the Service Level Agreement (SLA) for Email Security.cloud Service Availability?
What is the Service Level Agreement (SLA) for Email Security.cloud Service Availability? A. 95% B. 99.999% C. 100% D. 99% Reference: https://www.pugh.co.uk/wp-content/uploads/2017/08/Symantec-Email-Security.cloud_.pdf
Which type of Mail Transfer Agent is required for automated group synchronization?
Which type of Mail Transfer Agent is required for automated group synchronization? A. Domino B. Exchange C. Postix D. Google Apps
When does Real Time Link Following scan a webpage for malware?
When does Real Time Link Following scan a webpage for malware? A. After the Web Proxy has intercepted the web request B. After an email with a URL link is delivered to the end user C. After an email with a URL link is clicked the end user D. Before an email with a URL […]
What is the purpose of Email Impersonation Control?
What is the purpose of Email Impersonation Control? A. To guard against spoofed client’s domains B. To guard against “whaling” attacks C. To guard against spoofed government domains D. To guard against spoofed IP addresses Reference: https://help.symantec.com/cs/EMAIL_WEB.CLOUD/EMAILSECURITYCLOUD/v122075815_v116575109/Email-Impersonation-Control-Settings?locale=EN_US
What is the purpose of checking for Sender Policy Framework (SPF) Records in regards to email security?
What is the purpose of checking for Sender Policy Framework (SPF) Records in regards to email security? A. To ensure that the SMTP connection is encrypted B. To help validate domain ownership C. To help validate recipient email addresses D. To ensure that incoming emails are RFC compliant Reference: https://knowledge.broadcom.com/external/article?legacyId=TECH226211