1.
What is used to configure network level mail flow and access restrictions?
2.
Which statement describes the expected behavior of the PGP Whole Disk Recovery Token?
3.
Alice has encrypted her laptop computer using Symantec PGP Whole Disk Encryption. Bob, a system administrator, must access Alices system at night when she is unavailable. Which identifier can Bob use to authenticate at the BootGuard login?
4.
Which PGP Whole Disk Encryption feature enables an administrator to create a boot disk with PGP Whole Disk recovery tools included?
5.
Alice, a PGP Whole Disk Encryption user, has forgotten the passphrase for her encrypted boot volume. How can Alices administrator enable access to the volume?
6.
What does the Whole Disk Encryption Administrator Passphrase enable an administrator to do?

 
7.
Which recovery option should be used if the PGP Whole Disk Encryption user records are damaged and unavailable?
8.
Which of these items denotes a list of certificates that have been revoked?
9.
Which statement accurately describes the ADK in PGP Universal Server 3.2?
10.
Which statement describes what happens when an Additional Decryption Key (ADK) is imported into PGP Universal Server?