Which type of Mail Transfer Agent is required for automated group synchronization?
A. Domino
B. Exchange
C. Postix
D. Google Apps
What is the importance of selecting the appropriate content type, when creating a list for Data Protection policy?
A. The content type determines the condition the list resides in.
B. The content type determines whether the list can be used for Policy Based Encryption.
C. The content type determines how often a list can be used.
D. The content type determines what type of policies can be created.
Which ClientNet settings allow an administrator to configure the maximum email size allowed through Email Security.cloud?
A. Data Protection
B. Inbound Routes
C. Outbound Routes
D. Mail Platform
What is a SMTP server that is configured to allow anyone to send email through it called?
A. Open MTA
B. Open Email
C. Open Relay
D. Open Office
What is the purpose of creating groups for use with Data Protection?
A. To add email addresses for Address Registration
B. To apply Anti-Malware scanning from certain employees
C. To apply policies to certain employees
D. To record email address trigged by policies
What action does Symantec recommend for Image Control heuristics?
A. Copy suspected mail to the Image Control administrator
B. Block and delete suspected mail
C. Tag suspected mail within header
D. Redirect suspected mail to the Image Control administrator
What is the purpose of Email Security.cloud Click-Time protection?
A. Scan email web links for malware before email is delivered
B. Scan email web links for inappropriate content when the link is accessed by the user
C. Scan email web links for inappropriate content before email is delivered
D. Scan email web links for malware when the link is accessed by the user
What is the primary reason a business would require encrypted email delivery?
A. Industry Best Practice
B. Data Loss Prevention
C. Customer Security
D. Compliance
Where can an administrator locate the "Pen Number" for an email quarantined by Anti-Malware?
A. Administrator Quarantine
B. Track and Trace
C. Malware Release
D. End User Quarantine