Which process is acceptable for validating domain ownership within the “Add New Domain” wizard?
Which process is acceptable for validating domain ownership within the “Add New Domain” wizard?A . Text message validationB . DNS Validation with an added TXT RecordC . Email Security.cloud support ticketD . DNS Validation with an added SPF RecordView AnswerAnswer: B Explanation: Reference: https://docplayer.net/22114006-Deployment-document-for-office-365-and-symantec-cloud-v10.html (20)
Which type of Mail Transfer Agent is required for automated group synchronization?
Which type of Mail Transfer Agent is required for automated group synchronization?A . DominoB . ExchangeC . PostixD . Google AppsView AnswerAnswer: B
Which Email Security.cloud scanning technology is able to be modified by a customer?
Which Email Security.cloud scanning technology is able to be modified by a customer?A . Traffic ShapingB . Anti-SpamC . SMTP HeuristicsD . Anti-MalwareView AnswerAnswer: B
Which type of assessment is unavailable within Phishing Readiness?
Which type of assessment is unavailable within Phishing Readiness?A . Whaling AttackB . Open / ClickC . AttachmentD . Data ExposureView AnswerAnswer: A Explanation: Reference: https://knowledge.broadcom.com/external/article/150736/symantec-phishing-readinessfaq.html
What is the Service Level Agreement (SLA) for Email Security.cloud Service Availability?
What is the Service Level Agreement (SLA) for Email Security.cloud Service Availability?A . 95%B . 99.999%C . 100%D . 99%View AnswerAnswer: C Explanation: Reference: https://www.pugh.co.uk/wp-content/uploads/2017/08/Symantec-Email-Security.cloud_.pdf
What is the purpose of Email Impersonation Control?
What is the purpose of Email Impersonation Control?A . To guard against spoofed client’s domainsB . To guard against “whaling” attacksC . To guard against spoofed government domainsD . To guard against spoofed IP addressesView AnswerAnswer: B Explanation: Reference: https://help.symantec.com/cs/EMAIL_WEB.CLOUD/EMAILSECURITYCLOUD/ v122075815_v116575109/Email-Impersonation-Control-Settings?locale=EN_US
Where does Email Security.cloud reside when it is deployed?
Where does Email Security.cloud reside when it is deployed?A . Office 365B . Company Private CloudC . Wide Area NetworkD . Local Area NetworkView AnswerAnswer: A Explanation: Reference: https://www.it-klinika.rs/blog/uporedna-analiza-koliko-je-symantec-dobar-u-zastiti-vaseg-imejla/ email-security-cloud-en.pdf
Which quarantine settings are able to be managed within the Administrator Quarantine for Email Security.cloud?
Which quarantine settings are able to be managed within the Administrator Quarantine for Email Security.cloud?A . Domain Block ListsB . End User Block ListsC . Data Protection PoliciesD . Anti-Spam Scanning SettingsView AnswerAnswer: D Explanation: Reference: https://help.symantec.com/cs/SMG_10_6_6/SMG/v5747403_v125807409/QuarantineSettings?locale=EN_US
When does Real Time Link Following scan a webpage for malware?
When does Real Time Link Following scan a webpage for malware?A . After the Web Proxy has intercepted the web requestB . After an email with a URL link is delivered to the end userC . After an email with a URL link is clicked the end userD . Before...
What is the importance of selecting the appropriate content type, when creating a list for Data Protection policy?
What is the importance of selecting the appropriate content type, when creating a list for Data Protection policy?A . The content type determines the condition the list resides in.B . The content type determines whether the list can be used for Policy Based Encryption.C . The content type determines how...