VMware

Symantec Email Security.cloud R2 Technical Specialist

250-579

Validate your skills in Symantec Email Security.cloud R2 with the 250-579 exam.

195 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 171–180 of 195

Q171

What happens when a message is quarantined by the system?

  • A It is deleted permanently.
  • B It is sent to the sender.
  • C It is held for review.
  • D It is automatically encrypted.
Explanation Quarantining holds messages for review to determine further action, unlike the others.
Q172

Which service provides protection against zero-day threats in Symantec Email Security.cloud?

  • A Advanced Threat Protection
  • B Email Encryption
  • C Content Filtering
  • D Spam Prevention
Explanation Advanced Threat Protection is designed to detect zero-day threats, while the others serve different purposes like encryption and spam management.
Q173

A company needs to ensure that all outgoing emails are scanned for sensitive data. What should they enable?

  • A Inbound Email Protection
  • B Outbound Data Loss Prevention
  • C Spam Filtering
  • D URL Filtering
Explanation Outbound Data Loss Prevention is specifically designed to scan outgoing emails for sensitive data, while the other options do not fulfill this requirement.
Q174

What happens when a false positive occurs in email filtering?

  • A Email is blocked successfully
  • B Legitimate email is sent to spam
  • C All emails are filtered out
  • D No emails are processed
Explanation A false positive causes a legitimate email to be incorrectly classified as spam, whereas the other options do not correctly describe false positives.
Q175

What happens when a phishing email is detected by Symantec Email Security.cloud?

  • A It is quarantined for review.
  • B It is automatically forwarded.
  • C It is decrypted for analysis.
  • D It is marked as safe.
Explanation Quarantining is the standard protocol to evaluate potential threats, while other options do not provide risk mitigation.
Q176

A company needs to configure SPF records for their domain in Email Security.cloud. Which of the following is essential?

  • A Using multiple IP addresses.
  • B Defining a single allowed sender.
  • C Deny all other senders.
  • D Indicating legitimate mail servers.
Explanation Identifying legitimate mail servers is crucial for SPF efficacy, while the others may provide incorrect configurations.
Q177

You are configuring content filtering in Email Security.cloud. What is a recommended practice?

  • A Allow all attachments.
  • B Block emails with all images.
  • C Define explicit filter rules.
  • D Limit filtering to internal messages.
Explanation Explicit filter rules enhance security effectiveness, while the other options either inhibit functionality or are too restrictive.
Q178

Which service provides advanced threat defense in Email Security.cloud?

  • A Targeted Attack Protection
  • B Email Continuity
  • C Encryption Services
  • D Archiving Solutions
Explanation Targeted Attack Protection detects and blocks advanced threats, while others serve different functions.
Q179

A company needs a rule that ensures emails from a specific domain are always rejected. What type of rule should they create?

  • A Allow List Rule
  • B Block List Rule
  • C Spam Scoring Rule
  • D Policy Exception Rule
Explanation A Block List Rule specifically rejects emails from designated domains.
Q180

You are configuring the spam filtering settings in Email Security.cloud. What happens when the spam sensitivity is set to 'Low'?

  • A All emails will be archived
  • B Very few emails marked as spam
  • C Changes will not apply
  • D High-volume spam will be filtered
Explanation Setting sensitivity to 'Low' results in fewer emails being marked as spam.