Where does Email Security.cloud reside when it is deployed?
A. Office 365
B. Company Private Cloud
C. Wide Area Network
D. Local Area Network
Which type of Mail Transfer Agent is required for automated group synchronization?
A. Domino
B. Exchange
C. Postix
D. Google Apps
What is the Service Level Agreement (SLA) for Email Security.cloud Service Availability?
A. 95%
B. 99.999%
C. 100%
D. 99%
Which process is acceptable for validating domain ownership within the "Add New Domain" wizard?
A. Text message validation
B. DNS Validation with an added TXT Record
C. Email Security.cloud support ticket
D. DNS Validation with an added SPF Record
What is the importance of selecting the appropriate content type, when creating a list for Data Protection policy?
A. The content type determines the condition the list resides in.
B. The content type determines whether the list can be used for Policy Based Encryption.
C. The content type determines how often a list can be used.
D. The content type determines what type of policies can be created.
Which Email Security.cloud scanning technology is able to be modified by a customer?
A. Traffic Shaping
B. Anti-Spam
C. SMTP Heuristics
D. Anti-Malware
Which scanning technology is unable to provide individual customer reporting data within Email Security.cloud?
A. Image Composition Analysis
B. Data Protection
C. Cynic
D. Traffic Shaping
What is unable to be configured for the Email Security.cloud Anti-Malware Service?
A. Whether administrators can receive malware notification alerts
B. Auto-generated summary reports
C. Whether users can receive malware notification alerts
D. The aggressiveness of the malware scanning
Which sandbox technology is available for Email Security.cloud?
A. Cynic
B. Malware Analysis
C. Cylance
D. Carbon Black
Where does a company's MX Record reside?
A. Mail Transfer Agent
B. Postix
C. Firewall
D. DNS
When will an end user receive a block page from Click-Time Protection?
A. When a website followed from an email link contains specific inappropriate content
B. When a website followed from an email link contains large video files
C. When a website followed from an email link contains malware
D. When a website followed from an email link contains pornography
What is the purpose of creating groups for use with Data Protection?
A. To add email addresses for Address Registration
B. To apply Anti-Malware scanning from certain employees
C. To apply policies to certain employees
D. To record email address trigged by policies
What is the Symantec recommended best practice for testing a Data Protection policy?
A. Copy to administrator
B. Tag subject line
C. Log only
D. Redirect to administrator
When do Data Protection policies stop processing?
A. Once all of the created policies have been applied to an email
B. Once the email triggers a single policy
C. Once the policies have all timed out
D. Once the email triggers an exit event action of a policy
Which scanning technology will create an Advanced Threat Incident within ClientNet?
A. Cynic
B. Malware Signatures
C. Skeptic
D. Data Protection