Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Proofpoint PPAN01 - Certified Threat Protection Analyst Exam

Page: 1 / 2
Total 52 questions

Exhibit:

Which column indicates the number of users targeted by a malicious campaign or threat?

A.

Highlighted

B.

Intended

C.

At Risk

D.

Impacted

Evidence of an attack is no longer present due to a scheduled data purge. What would be the appropriate recommendation?

A.

Report the incident to the appropriate authorities for further investigation.

B.

Ignore the deletion of evidence as it cannot be recovered or used for any legal actions.

C.

Maintain the current data retention policy because it has been adequate until now.

D.

Re-evaluate the data retention policy to ensure evidence is adequately preserved.

Which of the following is an item that should be included in an incident report as part of the post-incident debrief?

A.

Network diagrams

B.

Incident response plan

C.

Adversary tactics and techniques

D.

Proofpoint threat landscape reporting

You would like to view the total number of uncleared threats or false positives that have been interacted with by users over the past 2 weeks. How can this be accomplished on the TAP Dashboard?

A.

On the Threats page, select Last 14 days and click on the “Intended” column header.

B.

On the Threats page, select Last 14 days and click on the “At Risk” column header.

C.

On the Threats page, select Last 14 days and click on the “Impacted” column header.

D.

On the Threats page, select Last 14 days and click on the “Highlighted” column header.

What is the primary function of the People Page in the Threat Protection Workbench and TAP Dashboard?

A.

To manage user permissions and access controls.

B.

To configure email filtering rules for specific users.

C.

To track user engagement with phishing simulations.

D.

To help identify and prioritize users affected by threats.

A college student receives the email shown in the exhibit.

What type of attack is being performed?

A.

Domain Hijacking

B.

Display Name Spoofing

C.

Lookalike Domain

D.

Reply-To Spoofing

In which part of the SMTP conversation can threat actors spoof information to make the message look safe to the recipient?

A.

Body

B.

Envelope

C.

Connection

D.

Header

Based on the exhibit,

which user would most benefit from attending security awareness training based on their behavior?

A.

Logan Green

B.

Scarlett Wilson

C.

Emma Taylor

D.

Jacob Lewis

The Attack Index is a calculation of the overall threat burden for a particular user. Which listed factor contributes to this calculation?

A.

VIP status

B.

The number of potential attack pathways

C.

The user’s group membership in Active Directory

D.

The severity and diversity of threats

Which two items should be included in an incident report to be discussed during a post-incident debrief? (Select two.)

A.

Software inventory

B.

Speculation about adversary attribution

C.

Product manuals

D.

Incident timeline

E.

Devices and systems involved