Which log would an administrator access to determine why an email was deleted by the scanner?
A. Update.log
B. Message Audit logs
C. Admin Audit logs
D. Messaginglog.log
Which two options are valid for pre-configured actions for the language identification feature in Symantec Messaging Gateway 10.5? (Select two.)
A. Hold message received in the following languages in the Suspect Spam Quarantine
B. Do not receive mail in the following languages
C. Send notification to the recipient for messages rceived in the following languages.
D. Only receive mail in the following languages
E. Add an X-Bulk header to messages received in the following languages
What happens to a message after it has been identified as a suspect virus and placed into the suspect virus quarantine?
A. It is automatically deleted after 7 days.
B. It is rescanned when the configured hold time has elapsed.
C. It is stored in the Central Quarantine Server.
D. It is forwarded to Symantec Security Response.
What happens to an IP listed in the Fastpass exclusions?
A. The IP will not be processed for spam,but will still be scanned for malware.
B. The IP will be excluded from spam scanning.
C. The IP will never get a Fastpass.
D. The IP will be excluded from compliance scanning.
A diagnostics package for a scanner-only appliance can be generated from the GUI in Symantec Messaging Gateway 10.5. If the package is small (less than 5 MB), which transfer protocol type should be used by the administrator to verify the diagnostics package before providing it to technical support for analysis?
A. SMTP
B. Download to desktop
C. FTP
D. SCP
Which feature, when enabled through the directory data sources, allows third party MTAs the ability to relay through Symantec Messaging Gateway 10.5 and protects it against becoming an open relay?
A. MTA verification
B. Recipient address validation
C. TLS certificate authentication
D. SMTP authentication
What are two functions of the Control Center? (Select two.)
A. It provides message management services.
B. It downloads spam definitions.
C. It hosts Spam Quarantine.
D. It downloads virus definitions.
E. It runs filters.
What is the function of a sender authentication scheme?
A. to check the IP reputation of a sending MTA at connection time
B. to verify that the sending MTA is authorized to send mail for a given domain
C. to enforce two-factor authentication between sending and receiving MTAs
D. to ensure that senders using content encryption can bypass spam scanning
What are the Symantec Global Bad and Good Sender lists based on?
A. Reputation data from Symantec Global Services
B. Reputation data from a global Symantec LiveUpdate server
C. Reputation data from the Symantec Global Intelligence Network
D. Global reputation data from Symantec Protection Center
An administrator needs to implement IM filtering. Which two types of DNS servers are required? (Select two.)
A. root DNS servers
B. DNS servers holding the primary zone data for Symantec Messaging Gateway email domains
C. DNS servers accessed by the internal endpoint to redirect internal IM traffic to a scanner forfiltering
D. DNS servers accessed by Symantec Messaging Gateway scanners to redirect outgoing IMtraffic to public IM networks on the Internet
E. DNS servers marked as authoritative for Symantec Messaging Gateway email domains