Valentine Day Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Symantec 250-445 Dumps

Page: 1 / 3
Total 70 questions

Administration of Symantec Email Security.cloud - v1 Questions and Answers

Question 1

What does Domain Keys Identified Mail (DKIM) use to verify that an email message was sent from an authorized mail server?

Options:

A.

Public Key Cryptography

B.

Sender Policy Framework

C.

Private Key Cryptography

D.

Domain Name Service

Question 2

Why should an administrator configure Symantec Validation & ID Protection (VIP) with ClientNet?

Options:

A.

To enable Data Protection Policies

B.

To enable Policy Based Encryption

C.

To enable Transport Layer Security

D.

To enable Two Factor Authentication

Question 3

What will the “Match All” condition trigger with Data Protection?

Options:

A.

It will automatically trigger the policy action for any email

B.

It will match all of the lists created within Data Protection

C.

It will match different emails to corporate senders

D.

It will match different emails to corporate recipients

Question 4

Which sandbox technology is available for Email Security.cloud?

Options:

A.

Cynic

B.

Malware Analysis

C.

Cylance

D.

Carbon Black

Question 5

What is the purpose of Email Security.cloud Click-Time protection?

Options:

A.

Scan email web links for malware before email is delivered

B.

Scan email web links for inappropriate content when the link is accessed by the user

C.

Scan email web links for inappropriate content before email is delivered

D.

Scan email web links for malware when the link is accessed by the user

Question 6

What are the two characteristics for an email to be considered Spam? (Choose two.)

Options:

A.

Unsolicited

B.

Malicious

C.

Unwanted

D.

Bulk

Question 7

What is the purpose of Email Impersonation Control?

Options:

A.

To guard against spoofed client’s domains

B.

To guard against “whaling” attacks

C.

To guard against spoofed government domains

D.

To guard against spoofed IP addresses

Question 8

What is the default action for a Data Protection Policy Based Encryption (PBE) Template policy?

Options:

A.

Tag the header and allow the message through

B.

Redirect to administrator

C.

Tag the subject and allow the message through

D.

Log only

Question 9

Which ClientNet settings allow an administrator to configure the maximum email size allowed through Email Security.cloud?

Options:

A.

Data Protection

B.

Inbound Routes

C.

Outbound Routes

D.

Mail Platform

Question 10

Which type of attack is executed by a cybercriminal posing as a senior executive of a company that targets other executives within that same organization?

Options:

A.

Executive attack

B.

Shark attack

C.

Business attack

D.

Whaling attack

Page: 1 / 3
Total 70 questions