Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Proofpoint TPAD01 - Threat Protection Administrator Exam

Page: 1 / 3
Total 72 questions

You are tasked with configuring outbound mail for an organization where an external domain has multiple MX records. Only one specific host is accepting mail. What is the best way to specify this specific hostname for outbound mail?

A.

Set the outbound mail route to point directly to the specific hostname within the Admin GUI.

B.

Configure the mail system to perform a DNS lookup and select one of the MX records.

C.

Set up an internal DNS record that points to the specific hostname for the external domain.

D.

Use a wildcard in the outbound mail configuration to send to any MX record in the Admin GUI.

You are reviewing the MTA logs for a message that has been deferred. Which Delivery Status Notification (DSN) code indicates that the receiving server was temporarily unable to process the message?

A.

4.x.x

B.

2.x.x

C.

3.x.x

D.

5.x.x

Review the filter log exhibit.

What two actions have taken place in the filter logs for this message?

What the exhibit shows clearly:

- URL Defense processing is present in the log

- A spam-related action/flag is present

A.

URL defense is blocking the message due to a malicious link.

B.

The email gets rejected due to excessive processing time.

C.

The message has been flagged as SPAM.

D.

The connection times out and is dropped by the sender.

E.

The message was rejected due to its size.

Which of the following are true regarding Spam Detection?

Pick the 3 correct responses below.

A.

If you enable the lowpriority rule, you should disable the bulk rule.

B.

Policy routes are used to decide which spam policy is applied to a message.

C.

Multiple policies can apply to a single inbound message.

D.

Only one Spam Detection rule will fire for a unique message going to a single recipient.

E.

Separate policies should be created for inbound and outbound messages.

F.

Spam Detection prevents internal users sending confidential data outbound.

During the configuration of an alert profile, which option is specifically required to ensure alerts are delivered to the appropriate individuals?

A.

A list of recipient email addresses

B.

A confirmation message for the alert

C.

A schedule for when alerts should be sent

D.

A description of the alert type

What are the three default methods available in Recipient Verification to verify that a recipient mailbox exists?

Pick the 3 correct responses below.

A.

Email the recipient

B.

SMTP verification

C.

LDAP verification

D.

User Repository verification

E.

CSV File verification

F.

DNS verification

A SAML authentication profile is configured on the Proofpoint Protection Server console. Which portals can be accessed using this configuration?

A.

PPS Console and End User Web

B.

End User Web and Email Continuity

C.

TAP Dashboard and Cloud Threat Response

D.

PPS Console and Cloud Admin

What is the primary function of Cloud Threat Response (CTR)?

A.

To automate the containment and remediation of email threats

B.

To manually analyze every email before delivery

C.

To encrypt all emails before sending them to recipients

D.

To filter out spam emails before they reach users’ inboxes

What is the primary purpose of the End User Web Interface in Proofpoint?

A.

To block all incoming emails automatically

B.

To allow users to manage their quarantined emails and email preferences

C.

To configure firewall settings and network security policies

D.

To send encrypted messages to external recipients

What is the main function of Threat Response Auto-Pull (TRAP)?

A.

To enable users to manage and delete their own suspected spam emails.

B.

To encrypt all emails sent internally to help prevent phishing attacks.

C.

To automatically retract malicious emails from the inboxes of impacted users.

D.

To block every email that contains links, regardless of sender or content.