1.
Having received a targeted attack from a spoofed email domain, a company wants to take advantage of DKIM validation for inbound mail. The messaging administrator has enabled sender authentication and DKIM validation and now needs to configure a content filtering policy to quarantine any messages that fail. Which condition should be met for the content filtering policy to fire?
2.
How does enabling and configuring sender authentication options in Symantec Messaging Gateway 10.5 help to protect against spam?
3.
What is an advantage of Symantec Content Encryption over TLS encryption?
4.
Symantec Messaging Gateway 10.5 includes a policy-based encryption feature. How is this new feature licensed?
5.
Which command allows the administrator to track messages from the command line interface (CLI)?
6.
Which command is used to collect the configuration and log files from the command line interface (CLI)?
7.
An administrator needs to determine which policies have triggered for a particular message. Which troubleshooting tool will help to identify issues with policy precedence and actions?
8.
An administrator recently investigated the debug logs for Symantec Messaging Gateway 10.5 and resolved an issue. A few days later the administrator discovers that the disk storage is filling up quickly. What is the likely cause?
9.
An employee reports that a message sent to a customer was never received by the customer. The employee provides sufficient information for the administrator to find the message using the Message Audit log. The employee wants to know where that message has gone. Which section of the Message Audit log detail page will provide this information?
10.
Where does an administrator specify how often a report is run?