Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Symantec 250-445 - Administration of Symantec Email Security.cloud - v1

Page: 1 / 3
Total 70 questions

What is the purpose of creating groups for use with Data Protection?

A.

To add email addresses for Address Registration

B.

To apply Anti-Malware scanning from certain employees

C.

To apply policies to certain employees

D.

To record email address trigged by policies

Which industry-standard type of policy, providing computer users with rules governing their actions on a company-owned computer, would Data Protection help enforce?

A.

Password Policy

B.

Firewall Policy

C.

Encryption Policy

D.

Acceptable Use Policy

What is the Symantec recommended best practice for testing a Data Protection policy?

A.

Copy to administrator

B.

Tag subject line

C.

Log only

D.

Redirect to administrator

Which Email Security.cloud service helps protect a company from unsolicited bulk email?

A.

Data Protection

B.

Anti-Spam

C.

Email Impersonation Control

D.

Advanced Threat Protection

Which sandbox technology is available for Email Security.cloud?

A.

Cynic

B.

Malware Analysis

C.

Cylance

D.

Carbon Black

Which type of attack is executed by a cybercriminal posing as a senior executive of a company that targets other executives within that same organization?

A.

Executive attack

B.

Shark attack

C.

Business attack

D.

Whaling attack

What is the purpose of checking for Sender Policy Framework (SPF) Records in regards to email security?

A.

To ensure that the SMTP connection is encrypted

B.

To help validate domain ownership

C.

To help validate recipient email addresses

D.

To ensure that incoming emails are RFC compliant

What is the Email Security.cloud Service Level Agreement (SLA) for Anti-Malware false positives?

A.

0.1%

B.

0.01%

C.

0.001%

D.

0.0001%

Which Email Security.cloud scanning service is unable to send emails to an end user’s quarantine?

A.

Image Control

B.

Anti-Spam

C.

Data Protection

D.

Anti-Malware

What happens when “0 Minutes” is selected with the Cynic Maximum Hold Time to an email?

A.

Email is delivered bypassing Cynic completely

B.

Email is delivered, but Cynic will continue to scan the message until a verdict is determined

C.

Email is redirected to a SECOPS administrator

D.

Email is put into a quarantine until Cynic determines a verdict