問題一覧
1
Which quarantine settings are able to be managed within the Administrator Quarantine for Email Security.cloud?
Anti-Spam Scanning Settings
2
What is the standard Time to Live (TTL) for an MX Record?
24-48 hours
3
Which type of assessment is unavailable within Phishing Readiness?
Whaling Attack
4
Where does Email Security.cloud reside when it is deployed?
Office 365
5
What is the purpose of checking for Sender Policy Framework (SPF) Records in regards to email security?
To help validate domain ownership
6
What is the purpose of Email Impersonation Control?
To guard against spoofed client’s domains
7
When does Real Time Link Following scan a webpage for malware?
After an email with a URL link is clicked the end user
8
Which type of Mail Transfer Agent is required for automated group synchronization?
Exchange
9
What is the Service Level Agreement (SLA) for Email Security.cloud Service Availability?
100%
10
Why should an administrator configure Symantec Validation & ID Protection (VIP) with ClientNet?
To enable Two Factor Authentication
11
Which process is acceptable for validating domain ownership within the “Add New Domain” wizard?
DNS Validation with an added TXT Record
12
What does Domain Keys Identified Mail (DKIM) use to verify that an email message was sent from an authorized mail server?
Public Key Cryptography
13
How long are emails identified as spam kept in an end user’s quarantine?
14 days
14
What is the importance of selecting the appropriate content type, when creating a list for Data Protection policy?
The content type determines what type of policies can be created.
15
What are the two characteristics for an email to be considered Spam?(Choose two.)
Unsolicited, Unwanted
16
What is the Email Security.cloud Service Level Agreement (SLA) for Anti-Spam false positives?
0.0003%
17
Where can an administrator locate the “Pen Number” for an email quarantined by Anti-Malware?
Malware Alert Notification email
18
A customer has purchased the Email Security.cloud solution. They would like to automatically receive SMS messages for any service alerts for Email Security.cloud. What is the URL required to configure this setting?
https://identity.symanteccloud.com
19
Which ClientNet settings allow an administrator to configure the maximum email size allowed through Email Security.cloud?
Mail Platform
20
Which Email Security.cloud scanning technology is able to be modified by a customer?
Anti-Spam
21
Which scanning technology is unable to provide individual customer reporting data within Email Security.cloud?
Traffic Shaping
22
Which method is unavailable to populate internal email addresses for use with Email Security.cloud Address Registration?
Exchange Journaling
23
What is the minimum configuration requirement a customer must make to enable Email Security.cloud?
Change MX Record
24
What happens when “0 Minutes” is selected with the Cynic Maximum Hold Time to an email?
Email is delivered, but Cynic will continue to scan the message until a verdict is determined
25
Which Email Security.cloud scanning technology is bypassed when a domain is added to an “Approved List”?
Anti-Spam
26
What is the default action for a Data Protection Policy Based Encryption (PBE) Template policy?
Redirect to administrator
27
Which type of attack is executed by a cybercriminal posing as a senior executive of a company that targets other executives within that same organization?
Whaling attack
28
What will the “Match All” condition trigger with Data Protection?
It will automatically trigger the policy action for any email
29
What does Address Registration protect against within the Email Security.cloud solution?
Domain impersonation
30
What is the default Transport Layer Security (TLS) port for encrypted email traffic?
443
31
What is unable to be configured for the Email Security.cloud AntiMalware Service?
The aggressiveness of the malware scanning
32
What is the Email Security.cloud Service Level Agreement (SLA) for Anti-Malware false positives?
0.0001%
33
What will Image Composition Analysis detect when the “heuristics” setting is selected within Image Control?
Pornographic images
34
Which sandbox technology is available for Email Security.cloud?
Cynic
35
What is a SMTP server that is configured to allow anyone to send email through it called?
Open Relay
36
What is the Symantec best practice regarding customer Mail Transfer Agent (MTA) configuration for Policy?
Enforced TLS connection between MTA and Symantec
37
Where does a company’s MX Record reside?
DNS
38
What is the Availability Service Level Agreement (SLA) for Email Security.cloud?
100%
39
Which industry-standard type of policy, providing computer users with rules governing their actions on a company-owned computer, would Data Protection help enforce?
Acceptable Use Policy
40
Which service is compatible with Automatic Remediation with Email Security.cloud?
Office 365
41
Where can an administrator locate the “Pen Number” for an email that has been quarantined by Anti-Malware?
Anti-Malware Detail Report
42
Which service needs to be enabled in order to populate Email Security.cloud data into a SIEM?
Email Data Feed
43
When will an end user receive a block page from Click-Time Protection?
When a website followed from an email link contains malware
44
What is the purpose of creating groups for use with Data Protection?
To apply policies to certain employees
45
What is an “outbound route”, as configured with Email Security.cloud?
The list of a customer IP addresses that will be sending email to Symantec
46
Why should an organization publish a Send Policy Framework (SPF) Record to DNS?
To display which hosts are authorized to send mail for a domain
47
What is the Symantec recommended best practice for testing a Data Protection policy?
Log only
48
Which Email Security.cloud scanning service is unable to send emails to an end user’s quarantine?
Anti-Spam
49
What action does Symantec recommend for Image Control heuristics?
Copy suspected mail to the Image Control administrator
50
What is the purpose of Email Security.cloud ClickTime protection?
Scan email web links for malware when the link is accessed by the user
51
Which Email Security.cloud service helps protect a company from unsolicited bulk email?
Anti-Spam
52
When do Data Protection policies stop processing?
Once the email triggers an exit event action of a policy
53
Which email client is compatible with the Email Security.cloud Email Submission add-in?
Microsoft Outlook
54
Which two file formats are available for Email Security.cloud reports? (Choose two.)
CSV, PDF
55
How often are end users able to receive quarantine summary notifications?
The frequency is configured by the administrator
56
What is the basic requirement for deploying Email Security.cloud?
Office 365
57
Which information is required in order to release an email from the Malware Quarantine?
Pen Number
58
Which Email Security.cloud service will help filter Newsletter and Marketing emails?
Anti-Spam
59
Which scanning technology will create an Advanced Threat Incident within ClientNet?
Malware Signatures
60
What is the default action for a non-PBE policy template?
Quarantine the message
61
What best describes Symantec Cynic?
A cloud sandbox tool
62
What is the primary reason a business would require encrypted email delivery?
Compliance
63
Which protocol is required for Email Security.cloud?
SMTP
64
How does an administrator create a detailed report for Email Security.cloud AntiMalware scanning?
Report request wizard within ClientNet
65
What is the purpose of Email Track and Trace?
To locate when an email was scanned by Email Security.cloud
66
What is the primary vector for the delivery of Advanced Persistent Threats, per the Internet Security Threat Reports from 2016 through 2018?
67
Which firewall port should be restricted to only accept email traffic from Email Security.cloud?
25
68
Where can an administrator locate the “Pen Number” for an email quarantined by Anti-Malware?
Administrator Quarantine
69
What is the default port for email traffic?
25
70
ESSにおけるFirstLayer技術は?
traffic shaver