What does Domain Keys Identified Mail (DKIM) use to verify that an email message was sent from an authorized mail server?
A. Public Key Cryptography
B. Sender Policy Framework
C. Private Key Cryptography
D. Domain Name Service
A customer has purchased the Email Security.cloud solution. They would like to automatically receive SMS messages for any service alerts for Email Security.cloud.
What is the URL required to configure this setting?
A. https://symantec.identity.com
B. https://symantec.clientnet.com
C. https://identity.symanteccloud.com
D. https://clientnet.symanteccloud.com
What is the minimum configuration requirement a customer must make to enable Email Security.cloud?
A. Install Address Registration Tool
B. Install Mail Security for Exchange
C. Create SMTP pointer
D. Change MX Record
Which type of attack is executed by a cybercriminal posing as a senior executive of a company that targets other executives within that same organization?
A. Executive attack
B. Shark attack
C. Business attack
D. Whaling attack
What will the "Match All" condition trigger with Data Protection?
A. It will automatically trigger the policy action for any email
B. It will match all of the lists created within Data Protection
C. It will match different emails to corporate senders
D. It will match different emails to corporate recipients
Which sandbox technology is available for Email Security.cloud?
A. Cynic
B. Malware Analysis
C. Cylance
D. Carbon Black
What is the Availability Service Level Agreement (SLA) for Email Security.cloud?
A. 99.9%
B. 99%
C. 99.999%
D. 100%
What is the basic requirement for deploying Email Security.cloud?
A. Office 365
B. SMTP
C. Microsoft Exchange
D. POP
How does an administrator create a detailed report for Email Security.cloud Anti-Malware scanning?
A. Report request wizard within ClientNet
B. Report request wizard within Administrator Quarantine
C. Contact support via ClientNet
D. Contact support via email
What is the primary vector for the delivery of Advanced Persistent Threats, per the Internet Security Threat Reports from 2016 through 2018?
A. USB drives
B. Website injections
C. Email
D. DNS Poisoning