Where does Email Security.cloud reside when it is deployed?
A. Office 365
B. Company Private Cloud
C. Wide Area Network
D. Local Area Network
When does Real Time Link Following scan a webpage for malware?
A. After the Web Proxy has intercepted the web request
B. After an email with a URL link is delivered to the end user
C. After an email with a URL link is clicked the end user
D. Before an email with a URL link is delivered to the end user
What is the Service Level Agreement (SLA) for Email Security.cloud Service Availability?
A. 95%
B. 99.999%
C. 100%
D. 99%
What does Domain Keys Identified Mail (DKIM) use to verify that an email message was sent from an authorized mail server?
A. Public Key Cryptography
B. Sender Policy Framework
C. Private Key Cryptography
D. Domain Name Service
How long are emails identified as spam kept in an end user's quarantine?
A. 14 days
B. 5 days
C. 30 days
D. 7 days
What is the importance of selecting the appropriate content type, when creating a list for Data Protection policy?
A. The content type determines the condition the list resides in.
B. The content type determines whether the list can be used for Policy Based Encryption.
C. The content type determines how often a list can be used.
D. The content type determines what type of policies can be created.
What is the minimum configuration requirement a customer must make to enable Email Security.cloud?
A. Install Address Registration Tool
B. Install Mail Security for Exchange
C. Create SMTP pointer
D. Change MX Record
Which sandbox technology is available for Email Security.cloud?
A. Cynic
B. Malware Analysis
C. Cylance
D. Carbon Black
Which industry-standard type of policy, providing computer users with rules governing their actions on a company-owned computer, would Data Protection help enforce?
A. Password Policy
B. Firewall Policy
C. Encryption Policy
D. Acceptable Use Policy
How does an administrator create a detailed report for Email Security.cloud Anti-Malware scanning?
A. Report request wizard within ClientNet
B. Report request wizard within Administrator Quarantine
C. Contact support via ClientNet
D. Contact support via email