Pass the Symantec Symantec Certified Specialist 250-445 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which Email Security.cloud scanning technology is able to be modified by a customer?

Options:

A.

Traffic Shaping


B.

Anti-Spam


C.

SMTP Heuristics


D.

Anti-Malware


Expert Solution
Questions # 12:

Which service is compatible with Automatic Remediation with Email Security.cloud?

Options:

A.

Google Apps


B.

Live Office


C.

Office 365


D.

Lotus Notes


Expert Solution
Questions # 13:

What is the primary vector for the delivery of Advanced Persistent Threats, per the Internet Security Threat Reports from 2016 through 2018?

Options:

A.

USB drives


B.

Website injections


C.

Email


D.

DNS Poisoning


Expert Solution
Questions # 14:

What is the Symantec recommended best practice for testing a Data Protection policy?

Options:

A.

Copy to administrator


B.

Tag subject line


C.

Log only


D.

Redirect to administrator


Expert Solution
Questions # 15:

What does Domain Keys Identified Mail (DKIM) use to verify that an email message was sent from an authorized mail server?

Options:

A.

Public Key Cryptography


B.

Sender Policy Framework


C.

Private Key Cryptography


D.

Domain Name Service


Expert Solution
Questions # 16:

Where does Email Security.cloud reside when it is deployed?

Options:

A.

Office 365


B.

Company Private Cloud


C.

Wide Area Network


D.

Local Area Network


Expert Solution
Questions # 17:

Which type of attack is executed by a cybercriminal posing as a senior executive of a company that targets other executives within that same organization?

Options:

A.

Executive attack


B.

Shark attack


C.

Business attack


D.

Whaling attack


Expert Solution
Questions # 18:

What are the two characteristics for an email to be considered Spam? (Choose two.)

Options:

A.

Unsolicited


B.

Malicious


C.

Unwanted


D.

Bulk


Expert Solution
Questions # 19:

What is the default action for a non-PBE policy template?

Options:

A.

Tag the subject line


B.

Copy to administrator


C.

Quarantine the message


D.

Log only


Expert Solution
Questions # 20:

What is the default action for a Data Protection Policy Based Encryption (PBE) Template policy?

Options:

A.

Tag the header and allow the message through


B.

Redirect to administrator


C.

Tag the subject and allow the message through


D.

Log only


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions