Download Symantec.250-445.SelfTestEngine.2020-04-10.35q.vcex

Download Exam

File Info

Exam Administration of Symantec Email Security.cloud (v1)
Number 250-445
File Name Symantec.250-445.SelfTestEngine.2020-04-10.35q.vcex
Size 21 KB
Posted Apr 10, 2020
Download Symantec.250-445.SelfTestEngine.2020-04-10.35q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

What is the standard Time to Live (TTL) for an MX Record?


  1. 12-24 hours
  2. 8 hours
  3. 24-48 hours
  4. 72 hours
Correct answer: A
Explanation:
Reference: https://help.dyn.com/ttl/
Reference: https://help.dyn.com/ttl/



Question 2

Which type of assessment is unavailable within Phishing Readiness?


  1. Whaling Attack
  2. Open / Click
  3. Attachment
  4. Data Exposure
Correct answer: A
Explanation:
Reference: https://knowledge.broadcom.com/external/article/150736/symantec-phishing-readiness-faq.html
Reference: https://knowledge.broadcom.com/external/article/150736/symantec-phishing-readiness-faq.html



Question 3

What is the purpose of Email Impersonation Control?


  1. To guard against spoofed client’s domains
  2. To guard against “whaling” attacks
  3. To guard against spoofed government domains
  4. To guard against spoofed IP addresses
Correct answer: B
Explanation:
Reference: https://help.symantec.com/cs/EMAIL_WEB.CLOUD/EMAILSECURITYCLOUD/v122075815_v116575109/Email-Impersonation-Control-Settings?locale=EN_US
Reference: https://help.symantec.com/cs/EMAIL_WEB.CLOUD/EMAILSECURITYCLOUD/v122075815_v116575109/Email-Impersonation-Control-Settings?locale=EN_US



Question 4

When does Real Time Link Following scan a webpage for malware?


  1. After the Web Proxy has intercepted the web request
  2. After an email with a URL link is delivered to the end user
  3. After an email with a URL link is clicked the end user
  4. Before an email with a URL link is delivered to the end user
Correct answer: C



Question 5

Why should an administrator configure Symantec Validation & ID Protection (VIP) with ClientNet?


  1. To enable Data Protection Policies
  2. To enable Policy Based Encryption
  3. To enable Transport Layer Security
  4. To enable Two Factor Authentication
Correct answer: D
Explanation:
Reference: https://help.symantec.com/cs/EMAIL_WEB.CLOUD/CLOUDPORTAL/v97248373_v116856119/Informazioni-sul-controllo-dell?locale=EN_US
Reference: https://help.symantec.com/cs/EMAIL_WEB.CLOUD/CLOUDPORTAL/v97248373_v116856119/Informazioni-sul-controllo-dell?locale=EN_US



Question 6

What is the importance of selecting the appropriate content type, when creating a list for Data Protection policy?


  1. The content type determines the condition the list resides in.
  2. The content type determines whether the list can be used for Policy Based Encryption.
  3. The content type determines how often a list can be used.
  4. The content type determines what type of policies can be created.
Correct answer: A
Explanation:
Reference: https://help.symantec.com/cs/EMAIL_WEB.CLOUD/DATAPROTECTIONCLOUD/v72686193_v117919862/Creating%20a%20list%20group%20in%20Email%20Data%20Protection?locale=EN_US
Reference: https://help.symantec.com/cs/EMAIL_WEB.CLOUD/DATAPROTECTIONCLOUD/v72686193_v117919862/Creating%20a%20list%20group%20in%20Email%20Data%20Protection?locale=EN_US



Question 7

What are the two characteristics for an email to be considered Spam? (Choose two.)


  1. Unsolicited
  2. Malicious
  3. Unwanted
  4. Bulk
Correct answer: AB
Explanation:
Reference:https://books.google.com.pk/books?id=QzndBAAAQBAJ&pg=PA469&lpg=PA469&dq=symantec+characteristics+for+an+email+to+be+considered+Spam+unsolicited+malicious&source=bl&ots=I_T3VTUt18&sig=ACfU3U2lvi_cJl3o9tiMTnm_vZUf2sj8Fg&hl=en&sa=X&ved=2ahUKEwj34oGA1dHoAhWrBWMBHYVLB8cQ6AEwCXoECA0QJg#v=onepage&q=symantec%20characteristics%20for%20an%20email%20to%20be%20considered%20Spam%20unsolicited%20malicious&f=false
Reference:
https://books.google.com.pk/books?id=QzndBAAAQBAJ&pg=PA469&lpg=PA469&dq=symantec+characteristics+for+an+email+to+be+considered+Spam+unsolicited+malicious&source=bl&ots=I_T3VTUt18&sig=ACfU3U2lvi_cJl3o9tiMTnm_vZUf2sj8Fg&hl=en&sa=X&ved=2ahUKEwj34oGA1dHoAhWrBWMBHYVLB8cQ6AEwCXoECA0QJg#v=onepage&q=symantec%20characteristics%20for%20an%20email%20to%20be%20considered%20Spam%20unsolicited%20malicious&f=false



Question 8

What is the Email Security.cloud Service Level Agreement (SLA) for Anti-Spam false positives?


  1. 0.3%
  2. 0.0003%
  3. 0.03%
  4. 0.003%
Correct answer: B
Explanation:
Reference: https://resemblesystems.com/wp-content/uploads/2017/10/Symantec-email-security-cloud-en.pdf (3)
Reference: https://resemblesystems.com/wp-content/uploads/2017/10/Symantec-email-security-cloud-en.pdf (3)



Question 9

Where can an administrator locate the “Pen Number” for an email quarantined by Anti-Malware?


  1. Cynic Alert Notification email
  2. Malware Alert Notification email
  3. Quarantine Alert Notification email
  4. Attack Alert Notification email
Correct answer: C
Explanation:
Reference: https://knowledge.broadcom.com/external/article?legacyId=HOWTO109647&SAMLRequest=%5BB%408d0355a
Reference: https://knowledge.broadcom.com/external/article?legacyId=HOWTO109647&SAMLRequest=%5BB%408d0355a



Question 10

Which Email Security.cloud scanning technology is able to be modified by a customer?


  1. Traffic Shaping
  2. Anti-Spam
  3. SMTP Heuristics
  4. Anti-Malware
Correct answer: B









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files