What happens when "0 Minutes" is selected with the Cynic Maximum Hold Time to an email?
A. Email is delivered bypassing Cynic completely
B. Email is delivered, but Cynic will continue to scan the message until a verdict is determined
C. Email is redirected to a SECOPS administrator
D. Email is put into a quarantine until Cynic determines a verdict
Which Email Security.cloud scanning technology is bypassed when a domain is added to an "Approved List"?
A. Anti-Malware
B. Anti-Spam
C. Address Registration
D. Cynic
Which type of attack is executed by a cybercriminal posing as a senior executive of a company that targets other executives within that same organization?
A. Executive attack
B. Shark attack
C. Business attack
D. Whaling attack
Which sandbox technology is available for Email Security.cloud?
A. Cynic
B. Malware Analysis
C. Cylance
D. Carbon Black
What is a SMTP server that is configured to allow anyone to send email through it called?
A. Open MTA
B. Open Email
C. Open Relay
D. Open Office
Which industry-standard type of policy, providing computer users with rules governing their actions on a company-owned computer, would Data Protection help enforce?
A. Password Policy
B. Firewall Policy
C. Encryption Policy
D. Acceptable Use Policy
What is an "outbound route", as configured with Email Security.cloud?
A. The list of a customer's domains
B. The list of a customer's internal email addresses
C. The list of a customer IP addresses that will be receiving email from Symantec
D. The list of a customer IP addresses that will be sending email to Symantec
What is the purpose of Email Security.cloud Click-Time protection?
A. Scan email web links for malware before email is delivered
B. Scan email web links for inappropriate content when the link is accessed by the user
C. Scan email web links for inappropriate content before email is delivered
D. Scan email web links for malware when the link is accessed by the user
Which Email Security.cloud service helps protect a company from unsolicited bulk email?
A. Data Protection
B. Anti-Spam
C. Email Impersonation Control
D. Advanced Threat Protection
What is the primary reason a business would require encrypted email delivery?
A. Industry Best Practice
B. Data Loss Prevention
C. Customer Security
D. Compliance