What is the expected encrypted email recipient experience when a Policy Based Encryption (PBE)
encrypted PD
B
What is the default port for email traffic?
D
Reference:
https://knowledge.broadcom.com/external/article?legacyId=tech88942
Where can an administrator locate the “Pen Number” for an email quarantined by Anti-Malware?
C
Reference:
https://knowledge.broadcom.com/external/article?legacyId=HOWTO109647&SAMLRequest=%
5BB%408d0355a
Which firewall port should be restricted to only accept email traffic from Email Security.cloud?
B
Reference:
https://knowledge.broadcom.com/external/article?legacyId=tech227034
What is the primary vector for the delivery of Advanced Persistent Threats, per the Internet Security
Threat Reports from 2016 through 2018?
C
Reference:
https://www-east.symantec.com/content/dam/symantec/docs/reports/istr-22-2017-en.pdf
What is the purpose of Email Track and Trace?
B
Reference:
https://knowledge.broadcom.com/external/article?legacyId=howto124881
How does an administrator create a detailed report for Email Security.cloud Anti-Malware scanning?
C
Which protocol is required for Email Security.cloud?
C
Reference:
https://community.broadcom.com/symantecenterprise/communities/community-
home/digestviewer/
viewthread?MessageKey=78eb0d64-21e5-4ec0-9a34-
b6b618a107ea&CommunityKey=f5d62f53-a337-4805-
842f-
e5bc06329b21&tab=digestviewer#bm78eb0d64-21e5-4ec0-9a34-b6b618a107ea
What is the primary reason a business would require encrypted email delivery?
D
What best describes Symantec Cynic?
B
Reference:
https://help.symantec.com/cs/ATP_3.2/ATP/v117615290_v127300344/Cynic?locale=EN_US