1.
A customer is experiencing image-based spam and phishing attacks that are negatively impacting messaging flow. Which Symantec solution should be recommended to this customer?
2.
Which Symantec solution informs an administrator that a particular server has excessive file system rights?
3.
A malicious insider was identified and recently terminated, and the organization wants to confirm that all company-owned hardware was returned by the employee. Which Symantec solution will help accomplish this?