What does Domain Keys Identified Mail (DKIM) use to verify that an email message was sent from an authorized mail server?
A. Public Key Cryptography
B. Sender Policy Framework
C. Private Key Cryptography
D. Domain Name Service
What happens when "0 Minutes" is selected with the Cynic Maximum Hold Time to an email?
A. Email is delivered bypassing Cynic completely
B. Email is delivered, but Cynic will continue to scan the message until a verdict is determined
C. Email is redirected to a SECOPS administrator
D. Email is put into a quarantine until Cynic determines a verdict
Which Email Security.cloud scanning technology is bypassed when a domain is added to an "Approved List"?
A. Anti-Malware
B. Anti-Spam
C. Address Registration
D. Cynic
What is the default action for a Data Protection Policy Based Encryption (PBE) Template policy?
A. Tag the header and allow the message through
B. Redirect to administrator
C. Tag the subject and allow the message through
D. Log only
Which type of attack is executed by a cybercriminal posing as a senior executive of a company that targets other executives within that same organization?
A. Executive attack
B. Shark attack
C. Business attack
D. Whaling attack
What is the Symantec best practice regarding customer Mail Transfer Agent (MTA) configuration for Policy?
A. S/MIME TLS connection between MTA and Symantec
B. Opportunistic TLS connection between MTA and Symantec
C. PGP TLS connection between MTA and Symantec
D. Enforced TLS connection between MTA and Symantec
Where does a company's MX Record reside?
A. Mail Transfer Agent
B. Postix
C. Firewall
D. DNS
What is the purpose of creating groups for use with Data Protection?
A. To add email addresses for Address Registration
B. To apply Anti-Malware scanning from certain employees
C. To apply policies to certain employees
D. To record email address trigged by policies
What is the basic requirement for deploying Email Security.cloud?
A. Office 365
B. SMTP
C. Microsoft Exchange
D. POP
How does an administrator create a detailed report for Email Security.cloud Anti-Malware scanning?
A. Report request wizard within ClientNet
B. Report request wizard within Administrator Quarantine
C. Contact support via ClientNet
D. Contact support via email