What is an advantage of Symantec Content Encryption over TLS encryption?
A. Ensures compliance with government-mandated regulations
B. TLS encryption provides better security than content encryption.
C. May be implemented without requiring SSL certificates for each scanner
D. Ensures secure end-to-end delivery of sensitive messages
Which two report file formats are available in Symantec Messaging Gateway 10.5 for executive summary reports? (Select two.)
A. CSV
B. PDF
C. DOCX
D. XML
E. HTML
Which two actions must be taken to allow end-users to create personal Good and Bad Senders lists? (Select two.)
A. add "Hold message in Spam Quarantine" action to Local Bad Senders domains
B. check the option "Enable end-user settings for this policy group"
C. configure an LDAP source with Authentication and Recipient Validation functions
D. configure an LDAP source with Authentication and Routing functions
E. configure an LDAP source with Authentication and Address Resolution functions
Which Symantec Messaging Gateway 10.5 feature will change the original domain of an internal user relaying mail outside of an organization?
A. Address masquerading
B. Address aliasing
C. Domain mapping
D. Content filtering
A diagnostics package for a scanner-only appliance can be generated from the GUI in Symantec Messaging Gateway 10.5. If the package is small (less than 5 MB), which transfer protocol type should be used by the administrator to verify the diagnostics package before providing it to technical support for analysis?
A. SMTP
B. Download to desktop
C. FTP
D. SCP
Symantec Messaging Gateway 10.5 is running out of disk space due to storing extended logs. The administrator is required to store extended log data for more than a year. Which action should the administrator take?
A. lower the maximum log storage limit
B. deploy Control Center on virtual appliance and add more disk space
C. configure remote logging
D. add higher capacity disks toapplianceRAID array
What is the source of information used to populate the Global Good and Global Bad senders list?
A. Multiple DNS-based IP reputation services
B. Proprietary feed from MessageLabs
C. Reputation data from the Symantec Global Intelligence Network
D. Global reputation data from Symantec Protection Center
Which two statistics can the administrator view regarding the custom anti-spam rulesets? (Select two.)
A. the "top-submitters" of missed spam or false positive detections
B. the "top submitters" of messages that are not valid and did not generate a custom rule
C. how many emails have been submitted for custom antispam rules
D. the effectiveness of the custom antispam rulesets compared to Symantec's rulesets
E. the top senders of messages detected by custon antispam rulesets