Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Symantec 250-445 - Administration of Symantec Email Security.cloud - v1

Page: 2 / 3
Total 70 questions

When will an end user receive a block page from Click-Time Protection?

A.

When a website followed from an email link contains specific inappropriate content

B.

When a website followed from an email link contains large video files

C.

When a website followed from an email link contains malware

D.

When a website followed from an email link contains pornography

What is the default port for email traffic?

A.

21

B.

23

C.

35

D.

25

When does Real Time Link Following scan a webpage for malware?

A.

After the Web Proxy has intercepted the web request

B.

After an email with a URL link is delivered to the end user

C.

After an email with a URL link is clicked the end user

D.

Before an email with a URL link is delivered to the end user

Which service needs to be enabled in order to populate Email Security.cloud data into a SIEM?

A.

Email Data Feed

B.

Python Script API

C.

SIEM Feed

D.

Provisioning API

What is the Symantec best practice regarding customer Mail Transfer Agent (MTA) configuration for Policy?

A.

S/MIME TLS connection between MTA and Symantec

B.

Opportunistic TLS connection between MTA and Symantec

C.

PGP TLS connection between MTA and Symantec

D.

Enforced TLS connection between MTA and Symantec

What is the purpose of Email Track and Trace?

A.

To locate when an email was processed by the receiving mail server

B.

To locate when an email was scanned by Email Security.cloud

C.

To locate when an email was processed by the sending mail server

D.

To locate when an email was processed by the archiving server

What is the standard Time to Live (TTL) for an MX Record?

A.

12-24 hours

B.

8 hours

C.

24-48 hours

D.

72 hours

How long are emails identified as spam kept in an end user’s quarantine?

A.

14 days

B.

5 days

C.

30 days

D.

7 days

What is the Availability Service Level Agreement (SLA) for Email Security.cloud?

A.

99.9%

B.

99%

C.

99.999%

D.

100%

What action does Symantec recommend for Image Control heuristics?

A.

Copy suspected mail to the Image Control administrator

B.

Block and delete suspected mail

C.

Tag suspected mail within header

D.

Redirect suspected mail to the Image Control administrator