ST0-250 - Symantec Messaging Gateway 10.5 Technical Assessment
Go back to Symantec
During which phase of inbound message flow does Symantec Messaging Gateway 10.5 accept, reject, or defer messages on the basis of the message envelope?
What is the recommended minimum hard-drive size for a virtual instance of Symantec Messaging Gateway 10.5?
During the installation and configuration process, when will Symantec Messaging Gateway 10.5 require access to the network?
prior to accessing the site setup wizard
Which URL must be accessed to successfully register a newly added Symantec Messaging Gateway 10.5 license file?
What is the default time period that a suspect virus can reside in the Suspect Virus Quarantine?
An employee reports that a message sent to a customer was rejected. The employee provides sufficient information for the administrator to find the message using the Message Audit log. The employee wants to know why that message was blocked. Which section of the Message Audit Log detail page would provide this information?
The helpdesk consistently receives calls from end-users asking why some attachments are stripped from their outbound email messages. How can the messaging administrator configure the content policy to inform the sender when and why this occurs?
add a notification action to the content filtering policy
What should an administrator do before performing a software update of Symantec Messaging Gateway 10.5?
Encrypt local backup
Symantec Messaging Gateway 10.5 is running out of disk space due to storing extended logs. The administrator is required to store extended log data for more than a year. Which action should the administrator take?
configure remote logging
Which two report file formats are available in Symantec Messaging Gateway 10.5 for executive summary reports? (Select two.)
What is the source of information used to populate the Global Good and Global Bad senders list?
Reputation data from the Symantec Global Intelligence Network
How does Symantec DLP communicate with Symantec Messaging Gateway (SMG) to indicate what type of incident (if any) is related to a given message?
Symantec DLP will add information into the message that can be interpreted by SMG and then send it to SMG via SMTP.
Bounce attack prevention is enabled. An incoming non-delivery report (NDR) is received and its signature fails to be verified. What does Symantec Messaging Gateway 10.5 do with the message by default?
rejects the message
Probe accounts should be created from which source of email addresses?
invalid recipient lists
An organization is receiving spam because of small targeted attacks from unknown senders. Which Symantec Messaging Gateway 10.5 feature should help slow down these types of attacks?
Symantec Messaging Gateway 10.5 includes a policy-based encryption feature. How is this new feature licensed?
The license is included with Symantec Content Encryption.
What do content incident folders allow administrators to configure?
granular access control
What is required before completing the bootstrap process of the Symantec Messaging Gateway 10.5 appliance?
DNS server IP address
Which prerequisite must be met to take advantage of the Connection Classification and Fastpass features?
Symantec Messaging Gateway must be the first SMTP hop into the network.
Which two tasks can an end-user perform while logged in to the Control Center when authentication and address resolution are enabled? (Select two.)
configure personal Good and Bad Sender lists
configure personal language preferences
Which command line interface (CLI) command displays the update.log to check the progress of a software update of Symantec Messaging Gateway 10.5?
What is the maximum number of incident folders that may be created in Symantec Messaging Gateway 10.5?
Which two functions of Symantec Messaging Gateway 10.5 can use information retrieved from a directory data source? (Select two.)
What is the default action taken during an email virus attack?
defer SMTP connection
What will trigger a spam policy by default in Symantec Messaging Gateway 10.5?
inserting the header X-Advertisement: spam into the message header
How are content filtering policies different from spam and virus policies?
Spam and virus policies use system-defined verdicts.
Which Symantec Messaging Gateway 10.5 feature will change the original domain of an internal user relaying mail outside of an organization?
What is required before attempting installation of the Symantec Messaging Gateway 10.5 appliance?
console access to the appliance
Which two can be used to verify that Symantec Messaging Gateway 10.5 is processing messages? (Select two)
view the Message Audit log
view message headers
When should Connection Classification be enabled?
when deployed at the edge of the network
After the bootstrap process is completed, which action is unavailable through the web-based interface?
Defining the Messaging Gateway role
What is one effect of deploying a Symantec Messaging Gateway scanner between an Internet email gateway and the internal groupware mail server?
Symantec Messaging Gateway scanners might identify the IP address of the internal gateway MTA as a source of spam.
With Fastpass enabled, which two verdicts may be excluded for messages with a pass? (Select two.)
Which TCP port is used for communication between the Control Center and the scanner(s)?
An organization has an extremely large LDAP database. What is done in Symantec Messaging Gateway 10.5 that will help prevent mail from backing up in the system during the initial directory building process?
preload the directory data cache
How does enabling and configuring sender authentication options in Symantec Messaging Gateway 10.5 help to protect against spam?
by protecting against messages with forged sender domains
Which additional Email Reports Data collection must be enabled to track Top Probe Accounts via reports?
What must be done before using Spam Quarantine?
Configure groups to have a policy to quarantine messages
What is the maximum number of rows a report can have?
What is an advantage of Symantec Content Encryption over TLS encryption?
Ensures secure end-to-end delivery of sensitive messages
A company uses multiple control centers. What must be done to ensure legitimate NDRs are recognized by Bounce Attack Prevention across all scanners?
configure the same seed value on each control center
What are the Symantec Global Bad and Good Sender lists based on?
Reputation data from the Symantec Global Intelligence Network
How could an administrator filter email more aggressively by adjusting the suspected spam score?
Lower the suspected spam score from the default to 60.
During which phase of outbound message flow does Symantec Messaging Gateway 10.5 determine whether the number of recipients exceeds the good number of recipients per message?
outbound SMTP session
Which two actions are valid for a content compliance policy? (Select two.)
Add a header to the message
Forward the message
Which logs will help an administrator determine why antispam rules have failed to update?
An administrator tests the default antivirus policies by sending a message with an encrypted attachment. When the administrator checks the recipient inbox, what appears?
The test email appears with a modified subject line.
When configuring remote logging, where are the logs redirected?
An administrator works for a pharmaceutical company that distributes Drug X. A content filtering policy using the premium compliance "Prescription Drug Names" dictionary resource (which includes Drug X as a predefined phrase), blocks any email from the Marketing department containing the drug name. Marketing has indicated that this is unacceptable but wishes to continue to block the use of other words or phrases in that dictionary. How can the administrator adjust the resources used by the current content filtering policy to resolve the Marketing department issue?
Disable Drug X from the "Prescription Drug Names" dictionary
After a configurable period of time, a suspect virus is released from the Suspect Virus Quarantine. What happens to it next?
It is rescanned.