Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Symantec 250-445 Administration of Symantec Email Security.cloud - v1 Exam Practice Test

Page: 1 / 7
Total 70 questions

Administration of Symantec Email Security.cloud - v1 Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

What will Image Composition Analysis detect when the “heuristics” setting is selected within Image Control?

Options:

A.

Images with embedded content

B.

Spoofed images

C.

Confidential images

D.

Pornographic images

Question 2

Which type of attack is executed by a cybercriminal posing as a senior executive of a company that targets other executives within that same organization?

Options:

A.

Executive attack

B.

Shark attack

C.

Business attack

D.

Whaling attack

Question 3

Which scanning technology will create an Advanced Threat Incident within ClientNet?

Options:

A.

Cynic

B.

Malware Signatures

C.

Skeptic

D.

Data Protection

Question 4

What is the Symantec recommended best practice for testing a Data Protection policy?

Options:

A.

Copy to administrator

B.

Tag subject line

C.

Log only

D.

Redirect to administrator

Question 5

What is the default action for a Data Protection Policy Based Encryption (PBE) Template policy?

Options:

A.

Tag the header and allow the message through

B.

Redirect to administrator

C.

Tag the subject and allow the message through

D.

Log only

Question 6

What best describes Symantec Cynic?

Options:

A.

An on-premises sandbox tool

B.

A cloud sandbox tool

C.

An on-premises signature based tool

D.

A cloud signature based tool

Question 7

How long are emails identified as spam kept in an end user’s quarantine?

Options:

A.

14 days

B.

5 days

C.

30 days

D.

7 days

Question 8

Which Email Security.cloud service will help filter Newsletter and Marketing emails?

Options:

A.

Anti-Malware

B.

Anti-Spam

C.

Data Protection

D.

Email Impersonation Control

Question 9

What is the importance of selecting the appropriate content type, when creating a list for Data Protection policy?

Options:

A.

The content type determines the condition the list resides in.

B.

The content type determines whether the list can be used for Policy Based Encryption.

C.

The content type determines how often a list can be used.

D.

The content type determines what type of policies can be created.

Question 10

Which ClientNet settings allow an administrator to configure the maximum email size allowed through Email Security.cloud?

Options:

A.

Data Protection

B.

Inbound Routes

C.

Outbound Routes

D.

Mail Platform

Page: 1 / 7
Total 70 questions