Which quarantine settings are able to be managed within the Administrator Quarantine for Email Security.cloud?
A. Domain Block Lists
B. End User Block Lists
C. Data Protection Policies
D. Anti-Spam Scanning Settings
What is the standard Time to Live (TTL) for an MX Record?
A. 12-24 hours
B. 8 hours
C. 24-48 hours
D. 72 hours
Which type of assessment is unavailable within Phishing Readiness?
A. Whaling Attack
B. Open / Click
C. Attachment
D. Data Exposure
What is the Service Level Agreement (SLA) for Email Security.cloud Service Availability?
A. 95%
B. 99.999%
C. 100%
D. 99%
Which process is acceptable for validating domain ownership within the "Add New Domain" wizard?
A. Text message validation
B. DNS Validation with an added TXT Record
C. Email Security.cloud support ticket
D. DNS Validation with an added SPF Record
What does Domain Keys Identified Mail (DKIM) use to verify that an email message was sent from an authorized mail server?
A. Public Key Cryptography
B. Sender Policy Framework
C. Private Key Cryptography
D. Domain Name Service
How long are emails identified as spam kept in an end user's quarantine?
A. 14 days
B. 5 days
C. 30 days
D. 7 days
What is the default action for a Data Protection Policy Based Encryption (PBE) Template policy?
A. Tag the header and allow the message through
B. Redirect to administrator
C. Tag the subject and allow the message through
D. Log only
What is unable to be configured for the Email Security.cloud Anti-Malware Service?
A. Whether administrators can receive malware notification alerts
B. Auto-generated summary reports
C. Whether users can receive malware notification alerts
D. The aggressiveness of the malware scanning
What is a SMTP server that is configured to allow anyone to send email through it called?
A. Open MTA
B. Open Email
C. Open Relay
D. Open Office
What is the Symantec best practice regarding customer Mail Transfer Agent (MTA) configuration for Policy?
A. S/MIME TLS connection between MTA and Symantec
B. Opportunistic TLS connection between MTA and Symantec
C. PGP TLS connection between MTA and Symantec
D. Enforced TLS connection between MTA and Symantec
What is the Symantec recommended best practice for testing a Data Protection policy?
A. Copy to administrator
B. Tag subject line
C. Log only
D. Redirect to administrator
What action does Symantec recommend for Image Control heuristics?
A. Copy suspected mail to the Image Control administrator
B. Block and delete suspected mail
C. Tag suspected mail within header
D. Redirect suspected mail to the Image Control administrator
How often are end users able to receive quarantine summary notifications?
A. Every other day
B. Once a week
C. Every day
D. The frequency is configured by the administrator
What best describes Symantec Cynic?
A. An on-premises sandbox tool
B. A cloud sandbox tool
C. An on-premises signature based tool
D. A cloud signature based tool