Symantec 250-445 practice test

Administration of Symantec Email Security.cloud - v1 Exam


Question 1

What is the expected encrypted email recipient experience when a Policy Based Encryption (PBE)
encrypted PD

  • A. The recipient receives an email that was encrypted in transit, but no credentials are needed to read
  • B. The recipient has to open a password protected PDF document to read the encrypted message.
  • C. The recipient has to log in to a secure portal to download a PDF message.
  • D. The recipient has to log in to a secure portal to retrieve the encrypted message.
Answer:

B

Discussions

Question 2

What is the default port for email traffic?

  • A. 21
  • B. 23
  • C. 35
  • D. 25
Answer:

D

Reference:
https://knowledge.broadcom.com/external/article?legacyId=tech88942

Discussions

Question 3

Where can an administrator locate the “Pen Number” for an email quarantined by Anti-Malware?

  • A. Administrator Quarantine
  • B. Track and Trace
  • C. Malware Release
  • D. End User Quarantine
Answer:

C

Reference:
https://knowledge.broadcom.com/external/article?legacyId=HOWTO109647&SAMLRequest=%
5BB%408d0355a

Discussions

Question 4

Which firewall port should be restricted to only accept email traffic from Email Security.cloud?

  • A. 23
  • B. 25
  • C. 21
  • D. 443
Answer:

B

Reference:
https://knowledge.broadcom.com/external/article?legacyId=tech227034

Discussions

Question 5

What is the primary vector for the delivery of Advanced Persistent Threats, per the Internet Security
Threat Reports from 2016 through 2018?

  • A. USB drives
  • B. Website injections
  • C. Email
  • D. DNS Poisoning
Answer:

C

Reference:
https://www-east.symantec.com/content/dam/symantec/docs/reports/istr-22-2017-en.pdf

Discussions

Question 6

What is the purpose of Email Track and Trace?

  • A. To locate when an email was processed by the receiving mail server
  • B. To locate when an email was scanned by Email Security.cloud
  • C. To locate when an email was processed by the sending mail server
  • D. To locate when an email was processed by the archiving server
Answer:

B

Reference:
https://knowledge.broadcom.com/external/article?legacyId=howto124881

Discussions

Question 7

How does an administrator create a detailed report for Email Security.cloud Anti-Malware scanning?

  • A. Report request wizard within ClientNet
  • B. Report request wizard within Administrator Quarantine
  • C. Contact support via ClientNet
  • D. Contact support via email
Answer:

C

Discussions

Question 8

Which protocol is required for Email Security.cloud?

  • A. POP
  • B. FTP
  • C. SMTP
  • D. UDP
Answer:

C

Reference:
https://community.broadcom.com/symantecenterprise/communities/community-
home/digestviewer/
viewthread?MessageKey=78eb0d64-21e5-4ec0-9a34-
b6b618a107ea&CommunityKey=f5d62f53-a337-4805-
842f-
e5bc06329b21&tab=digestviewer#bm78eb0d64-21e5-4ec0-9a34-b6b618a107ea

Discussions

Question 9

What is the primary reason a business would require encrypted email delivery?

  • A. Industry Best Practice
  • B. Data Loss Prevention
  • C. Customer Security
  • D. Compliance
Answer:

D

Discussions

Question 10

What best describes Symantec Cynic?

  • A. An on-premises sandbox tool
  • B. A cloud sandbox tool
  • C. An on-premises signature based tool
  • D. A cloud signature based tool
Answer:

B

Reference:
https://help.symantec.com/cs/ATP_3.2/ATP/v117615290_v127300344/Cynic?locale=EN_US

Discussions
To page 2