Which type of assessment is unavailable within Phishing Readiness?
A. Whaling Attack
B. Open / Click
C. Attachment
D. Data Exposure
What is the purpose of checking for Sender Policy Framework (SPF) Records in regards to email security?
A. To ensure that the SMTP connection is encrypted
B. To help validate domain ownership
C. To help validate recipient email addresses
D. To ensure that incoming emails are RFC compliant
What is the purpose of Email Impersonation Control?
A. To guard against spoofed client's domains
B. To guard against "whaling" attacks
C. To guard against spoofed government domains
D. To guard against spoofed IP addresses
What is the Service Level Agreement (SLA) for Email Security.cloud Service Availability?
A. 95%
B. 99.999%
C. 100%
D. 99%
What are the two characteristics for an email to be considered Spam? (Choose two.)
A. Unsolicited
B. Malicious
C. Unwanted
D. Bulk
What is the minimum configuration requirement a customer must make to enable Email Security.cloud?
A. Install Address Registration Tool
B. Install Mail Security for Exchange
C. Create SMTP pointer
D. Change MX Record
Which industry-standard type of policy, providing computer users with rules governing their actions on a company-owned computer, would Data Protection help enforce?
A. Password Policy
B. Firewall Policy
C. Encryption Policy
D. Acceptable Use Policy
Which Email Security.cloud scanning service is unable to send emails to an end user's quarantine?
A. Image Control
B. Anti-Spam
C. Data Protection
D. Anti-Malware
When do Data Protection policies stop processing?
A. Once all of the created policies have been applied to an email
B. Once the email triggers a single policy
C. Once the policies have all timed out
D. Once the email triggers an exit event action of a policy
What is the primary reason a business would require encrypted email delivery?
A. Industry Best Practice
B. Data Loss Prevention
C. Customer Security
D. Compliance