What is the purpose of Email Impersonation Control?
A. To guard against spoofed client's domains
B. To guard against "whaling" attacks
C. To guard against spoofed government domains
D. To guard against spoofed IP addresses
Which type of Mail Transfer Agent is required for automated group synchronization?
A. Domino
B. Exchange
C. Postix
D. Google Apps
What is the Service Level Agreement (SLA) for Email Security.cloud Service Availability?
A. 95%
B. 99.999%
C. 100%
D. 99%
What does Domain Keys Identified Mail (DKIM) use to verify that an email message was sent from an authorized mail server?
A. Public Key Cryptography
B. Sender Policy Framework
C. Private Key Cryptography
D. Domain Name Service
What is a SMTP server that is configured to allow anyone to send email through it called?
A. Open MTA
B. Open Email
C. Open Relay
D. Open Office
Which service is compatible with Automatic Remediation with Email Security.cloud?
A. Google Apps
B. Live Office
C. Office 365
D. Lotus Notes
What is an "outbound route", as configured with Email Security.cloud?
A. The list of a customer's domains
B. The list of a customer's internal email addresses
C. The list of a customer IP addresses that will be receiving email from Symantec
D. The list of a customer IP addresses that will be sending email to Symantec
What is the Symantec recommended best practice for testing a Data Protection policy?
A. Copy to administrator
B. Tag subject line
C. Log only
D. Redirect to administrator
How often are end users able to receive quarantine summary notifications?
A. Every other day
B. Once a week
C. Every day
D. The frequency is configured by the administrator