ST0-250 - Symantec Messaging Gateway 10.5 Technical Assessment

Go back to Symantec

Example Questions

During which phase of inbound message flow does Symantec Messaging Gateway 10.5 accept, reject, or defer messages on the basis of the message envelope? What is the recommended minimum hard-drive size for a virtual instance of Symantec Messaging Gateway 10.5? During the installation and configuration process, when will Symantec Messaging Gateway 10.5 require access to the network? Which URL must be accessed to successfully register a newly added Symantec Messaging Gateway 10.5 license file? What is the default time period that a suspect virus can reside in the Suspect Virus Quarantine? An employee reports that a message sent to a customer was rejected. The employee provides sufficient information for the administrator to find the message using the Message Audit log. The employee wants to know why that message was blocked. Which section of the Message Audit Log detail page would provide this information? The helpdesk consistently receives calls from end-users asking why some attachments are stripped from their outbound email messages. How can the messaging administrator configure the content policy to inform the sender when and why this occurs? What should an administrator do before performing a software update of Symantec Messaging Gateway 10.5? Symantec Messaging Gateway 10.5 is running out of disk space due to storing extended logs. The administrator is required to store extended log data for more than a year. Which action should the administrator take? Which two report file formats are available in Symantec Messaging Gateway 10.5 for executive summary reports? (Select two.) What is the source of information used to populate the Global Good and Global Bad senders list? How does Symantec DLP communicate with Symantec Messaging Gateway (SMG) to indicate what type of incident (if any) is related to a given message? Bounce attack prevention is enabled. An incoming non-delivery report (NDR) is received and its signature fails to be verified. What does Symantec Messaging Gateway 10.5 do with the message by default? Probe accounts should be created from which source of email addresses? An organization is receiving spam because of small targeted attacks from unknown senders. Which Symantec Messaging Gateway 10.5 feature should help slow down these types of attacks? Symantec Messaging Gateway 10.5 includes a policy-based encryption feature. How is this new feature licensed? What do content incident folders allow administrators to configure? What is required before completing the bootstrap process of the Symantec Messaging Gateway 10.5 appliance? Which prerequisite must be met to take advantage of the Connection Classification and Fastpass features? Which two tasks can an end-user perform while logged in to the Control Center when authentication and address resolution are enabled? (Select two.) Which command line interface (CLI) command displays the update.log to check the progress of a software update of Symantec Messaging Gateway 10.5? What is the maximum number of incident folders that may be created in Symantec Messaging Gateway 10.5? Which two functions of Symantec Messaging Gateway 10.5 can use information retrieved from a directory data source? (Select two.) What is the default action taken during an email virus attack? What will trigger a spam policy by default in Symantec Messaging Gateway 10.5? How are content filtering policies different from spam and virus policies? Which Symantec Messaging Gateway 10.5 feature will change the original domain of an internal user relaying mail outside of an organization? What is required before attempting installation of the Symantec Messaging Gateway 10.5 appliance? Which two can be used to verify that Symantec Messaging Gateway 10.5 is processing messages? (Select two) When should Connection Classification be enabled? After the bootstrap process is completed, which action is unavailable through the web-based interface? What is one effect of deploying a Symantec Messaging Gateway scanner between an Internet email gateway and the internal groupware mail server? With Fastpass enabled, which two verdicts may be excluded for messages with a pass? (Select two.) Which TCP port is used for communication between the Control Center and the scanner(s)? An organization has an extremely large LDAP database. What is done in Symantec Messaging Gateway 10.5 that will help prevent mail from backing up in the system during the initial directory building process? How does enabling and configuring sender authentication options in Symantec Messaging Gateway 10.5 help to protect against spam? Which additional Email Reports Data collection must be enabled to track Top Probe Accounts via reports? What must be done before using Spam Quarantine? What is the maximum number of rows a report can have? What is an advantage of Symantec Content Encryption over TLS encryption? A company uses multiple control centers. What must be done to ensure legitimate NDRs are recognized by Bounce Attack Prevention across all scanners? What are the Symantec Global Bad and Good Sender lists based on? How could an administrator filter email more aggressively by adjusting the suspected spam score? During which phase of outbound message flow does Symantec Messaging Gateway 10.5 determine whether the number of recipients exceeds the good number of recipients per message? Which two actions are valid for a content compliance policy? (Select two.) Which logs will help an administrator determine why antispam rules have failed to update? An administrator tests the default antivirus policies by sending a message with an encrypted attachment. When the administrator checks the recipient inbox, what appears? When configuring remote logging, where are the logs redirected? An administrator works for a pharmaceutical company that distributes Drug X. A content filtering policy using the premium compliance "Prescription Drug Names" dictionary resource (which includes Drug X as a predefined phrase), blocks any email from the Marketing department containing the drug name. Marketing has indicated that this is unacceptable but wishes to continue to block the use of other words or phrases in that dictionary. How can the administrator adjust the resources used by the current content filtering policy to resolve the Marketing department issue? After a configurable period of time, a suspect virus is released from the Suspect Virus Quarantine. What happens to it next?