A) Verdict(s)
B) Action(s)
C) IP Blocklist Lookup Tool
D) Block Reason
Correct Answer
verified
Multiple Choice
A) Indexed Document Matching (IDM)
B) Described Content Matching (DCM)
C) Exact Data Matching (DCM)
D) Optical Character Recognition (OCR)
Correct Answer
verified
Multiple Choice
A) The license is included with Symantec Protection Suite.
B) The license is included with Symantec Messaging Gateway 10.5.
C) The license is included with Symantec Content Encryption.
D) The license is available with a PGP Universal license.
Correct Answer
verified
Multiple Choice
A) Apply a new global agent uninstall password in the Enforce management console.
B) Manually delete all the Endpoint agent files from the test computer and install a new agent package.
C) Replace the PGPsdk.dll file on the agent's assigned Endpoint server with a copy from a different Endpoint server Replace the PGPsdk.dll file on the agent's assigned Endpoint server with a copy from a different Endpoint server
D) Use the UninstallPwdGenerator to create an UninstallPasswordKey . Use the UninstallPwdGenerator to create an UninstallPasswordKey .
Correct Answer
verified
Multiple Choice
A) Exact Data Matching (EDM)
B) Described Content Matching (DCM)
C) Vector Machine Learning (VML)
D) Indexed Document Matching (IDM)
Correct Answer
verified
Multiple Choice
A) Network Discover
B) Cloud Service for Email
C) Endpoint Prevent
D) Network Protect
Correct Answer
verified
Multiple Choice
A) 10.10.10.1
B) 10.10.10.11
C) 10.10.10.21
D) 10.10.10.31
Correct Answer
verified
Multiple Choice
A) adding a text file attachment with the word SPAM to the message
B) inserting the header X-Bulk: into the message header
C) prepending the subject line of the message with the following: [SPAM TEST]
D) inserting the header X-Advertisement: spam into the message header
Correct Answer
verified
Multiple Choice
A) Advanced Server Settings from the Endpoint Server Configuration
B) Advanced Monitoring from the Agent Configuration
C) Advanced Agent Settings from the Agent Configuration
D) Application Monitoring from the Agent Configuration
Correct Answer
verified
Multiple Choice
A) Indexed Document Matching (IDM)
B) Vector Machine Learning (VML)
C) Exact Data Matching (EDM)
D) Described Content Matching (DCM)
Correct Answer
verified
Multiple Choice
A) Ensures compliance with government-mandated regulations
B) TLS encryption provides better security than content encryption.
C) May be implemented without requiring SSL certificates for each scanner
D) Ensures secure end-to-end delivery of sensitive messages
Correct Answer
verified
Multiple Choice
A) An absence of a trained incident response team
B) A disgruntled employee for a job with a competitor
C) Merger and Acquisition activities
D) Lack of training and awareness
E) Broken business processes
Correct Answer
verified
Multiple Choice
A) Network Prevent for Email
B) Network Discover
C) Network Monitor
D) Network Prevent for Web
Correct Answer
verified
Multiple Choice
A) Creation of custom spam rules using SenderID
B) Fastpass
C) Domain whitelisting
D) Sender authentication
Correct Answer
verified
Multiple Choice
A) The IP will not be processed for spam, but will still be scanned for malware.
B) The IP will be excluded from spam scanning.
C) The IP will never get a Fastpass.
D) The IP will be excluded from compliance scanning.
Correct Answer
verified
Multiple Choice
A) Block
B) User Cancel
C) Encrypt
D) Notify
Correct Answer
verified
Multiple Choice
A) Smart Response on the Incident page
B) Automated Response on the Incident Snapshot page
C) Smart Response on an Incident List report
D) Automated Response on an Incident List report
Correct Answer
verified
Multiple Choice
A) Indexed Document Matching (IDM)
B) Described Content Matching (DCM)
C) Exact Data Matching (EDM)
D) Optical Character Recognition (OCR)
Correct Answer
verified
Multiple Choice
A) Any customer-hosted private cloud
B) Amazon Web Services
C) AT&T
D) Verizon
E) Rackspace
Correct Answer
verified
Multiple Choice
A) Policy report, filtered on date and summarized by policy
B) Policy Trend report, summarized by policy, then quarter
C) Policy report, filtered on quarter and summarized by policy
D) Policy Trend report, summarized by policy, then severity
Correct Answer
verified
Showing 21 - 40 of 138
Related Exams