Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Proofpoint TPAD01 - Threat Protection Administrator Exam

Page: 2 / 3
Total 72 questions

Which URLs are valid entries for the configuration shown in the screenshot?

A.

http://www.example.com

and ftp://www.example.com

B.

www.example.com

and https://www.example.com

C.

example.com/mail and smtp://example.com

D.

mail.example.com:25 and file://example.com

How does TAP’s Message Defense feature work for unknown attachments?

A.

It scans only PDF attachments for malware

B.

It automatically deletes all attachments from external senders

C.

It allows attachments through only if the sender is on a safelist

D.

It detonates suspicious attachments in a sandbox to analyze their behavior

What is the purpose of roles when assigning administrative access to Proofpoint Protection Server?

Pick the 2 correct responses below.

A.

To allow analysts to request temporary permissions to accomplish a difficult task when needed.

B.

To allocate different timeouts to each portal depending on the logged-in administrative user.

C.

To allow individuals to create their own color and picture themes for all the interfaces.

D.

To make administration easier when onboarding analysts and administrators needing to use the portals.

E.

To allow individuals to be granted different abilities and permission to the administrative portals.

What is the difference between the Discard and Reject dispositions?

A.

Reject drops the email and informs the sender of the rejection.

B.

Discard temporarily rejects the email due to resource constraints.

C.

Reject drops the email without notifying the sender of the delivery failure.

D.

Discard drops the email and informs the sender of the rejection.

When reviewing the Audit Logs in the context of cluster monitoring, what type of information is primarily available?

A.

Live performance statistics and current status of cluster node workloads

B.

Alerts triggered by excessive use of cluster resources or capacity limits

C.

Detailed system faults and warning messages from cluster operations

D.

Records of administrator access and changes made to cluster settings

You are using Smart Search within the PPS Admin UI to investigate the final disposition of a message. Smart Search shows the message is Quarantined/Discard to adqueue. How do you trace the message?

A.

Use the session ID (sid) to search

B.

Select Rule adqueue

C.

Use the message ID to search

D.

Use the message GUID to search

You log into the Protection Server and a rule you created yesterday is no longer enabled. Where can you find out what happened to the rule you created?

A.

Smart Search

B.

Audit Logs

C.

Alert Viewer

D.

Log Viewer

Refer to the exhibit below to see the interface used in this scenario.

An email arrives inbound to the protection server, it is going to a single recipient and belongs

to the legal and default_inbound policy routes.

Which of the following is true regarding the virus policies?

A.

The outbound policy is applied first and then the default policy will be applied.

B.

The default policy is applied first and then the inbound_protected policy is applied.

C.

The inbound_protected and default policy will be applied to the message in that order.

D.

The inbound_protected policy will apply to the message. All other policies will be ignored.

You need to generate a report from the Cloud Admin Interface. What file formats are available to export?

A.

XLSX and XML

B.

CSV and JSON

C.

CSV and PDF

D.

PDF and XML

When setting up an Import/Authentication Profile in PPS, which of the following is a required piece of information to connect to an LDAP server?

A.

POP3 server username

B.

LDAP server hostname or IP address

C.

SMTP server address

D.

IMAP server port number