Symantec Messaging Gateway 10.5 is certified for non-virtual deployment on which hardware devices?
A. Symantec 2950 series appliances
B. Symantec 3570 series appliances
C. Symantec 7100 series appliances
D. Symantec 8300 series appliances
The administrator of a Japanese organization wants to view dates and times within the web-based interface of Symantec Messaging Gateway 10.5 in Japanese format. Which step during the site setup wizard allows the administrator to meet this requirement?
A. System Locale Setup
B. Language Setup
C. Country Setup
D. Time Zone Setup
Probe accounts should be created from which source of email addresses?
A. automatically generated using the built-in tool
B. addresses of previous employees
C. current NDR reports
D. invalid recipient lists
How are content filtering policies different from spam and virus policies?
A. Content filtering policies use system-defined verdicts.
B. Spam and virus polices use administrator-defined verdicts.
C. Spam and virus policies use system-defined verdicts.
D. Content filtering policies use end user-defined verdicts.
Which Symantec Messaging Gateway 10.5 feature improves responsiveness to new spam threats and increases overall antispam effectiveness?
A. rapid release definitions
B. Fastpass
C. microupdates
D. real time updates
The Symantec Messaging Gateway 10.5 appliance will be deployed with the following topology:
Internet Default Gateway (10.10.10.1) <--> Email Gateway (10.10.10.11) <--> Symantec Messaging
Gateway (10.10.10.21) <--> Internal Mail Server (10.10.10.31) Which IP address should be specified in the
Mail Filtering - Non-local Mail Delivery page of the site setup wizard?
A. 10.10.10.1
B. 10.10.10.11
C. 10.10.10.21
D. 10.10.10.31
Where are options for backup and restore of Symantec Messaging Gateway 10.5 located?
A. Administration -> Version
B. Administration -> Utilities
C. Administration -> Restore/Download
D. Administration -> Updates
How can an administrator view log data in real time?
A. in the UI select Reports -> view logs
B. from the command line interface (CLI) run the watchlog -l command
C. from the command line interface (CLI) run the tail -f command
D. from the command line interface (CLI) run the monitor -f command
Which Directory Data Source function must be configured to enable end-user spam quarantine?
A. SMTP authentication
B. address resolution
C. recipient validation
D. authentication
An administrator tests the default antivirus policies by sending a message with an encrypted attachment. When the administrator checks the recipient inbox, what appears?
A. The test email appears with a modified subject line.
B. A system-generated message appears concerning an unscannable attachment.
C. A message with a pointer to the Suspect Virus Quarantine appears.
D. The email is missing due to deletion by the system.