Pass4itsure > Symantec > STS Messaging Gateway > ST0-250 > ST0-250 Online Practice Questions and Answers

ST0-250 Online Practice Questions and Answers

Questions 4

What do content incident folders allow administrators to configure?

A. granular access control

B. the X- header added for client processing

C. the incident folder names passed to the client

D. additional folders where end-users can store junk mail

Buy Now
Questions 5

True file typing is a feature used to combat which behavior?

A. intentionally malforming the MIME headers in order to bypass virus scanning of attachments

B. removing or disguising extensions to bypass virus scanning

C. obfuscating a directory harvest attack

D. tricking users into launching executable files

Buy Now
Questions 6

By default, which port does Symantec Messaging Gateway 10.5 use to retrieve updated spam definitions?

A. 389

B. 443

C. 8080

D. 41002

Buy Now
Questions 7

An organization is receiving spam because of small targeted attacks from unknown senders. Which Symantec Messaging Gateway 10.5 feature should help slow down these types of attacks?

A. Global Bad Senders list

B. directory harvest attack prevention

C. Global reputation analysis

D. Connection classification

Buy Now
Questions 8

Following the leak of confidential business contracts, a company's Legal department mandates that all outbound communication from the Finance department must be secure at all times. Which two policy strategies can help the messaging administrator accomplish this in Symantec Messaging Gateway 10.5? (Select two.)

A. Deliver message using TLS

B. Block direct client access to corporate email servers

C. Deliver message with notification

D. Deliver message with content encryption

E. Configure firewall to only accept outbound SMTP connections from the Symantec Messaging Gateway scanners

Buy Now
Questions 9

What is the function of a sender authentication scheme?

A. to check the IP reputation of a sending MTA at connection time

B. to verify that the sending MTA is authorized to send mail for a given domain

C. to enforce two-factor authentication between sending and receiving MTAs

D. to ensure that senders using content encryption can bypass spam scanning

Buy Now
Questions 10

When configuring DKIM signing, how should the domain key generated from the public RSA key be published?

A. as a text record in the DNS zone for the sending domain

B. in plain text as part of the SMTP outbound greeting

C. as a .txt file on the Internet facing the Symantec Messaging Gateway

D. as a .txt file on the sending domain corporate website

Buy Now
Questions 11

What is the current name of the LDAP synchronization technology used within the Symantec Messaging Gateway?

A. Dynamic Data Cache

B. Directory Data Service

C. Active Directory

D. Domain Controller Interface (DCInterface)

Buy Now
Questions 12

An administrator tests the default antivirus policies by sending a message with an encrypted attachment. When the administrator checks the recipient inbox, what appears?

A. The test email appears with a modified subject line.

B. A system-generated message appears concerning an unscannable attachment.

C. A message with a pointer to the Suspect Virus Quarantine appears.

D. The email is missing due to deletion by the system.

Buy Now
Questions 13

How could an administrator filter email more aggressively by adjusting the suspected spam score?

A. Raise the suspected spam score from the default to 99.

B. Lower the suspected spam score from the default to 60.

C. Lower the suspected spam score from the default to 75.

D. Raise the suspected spam score from the default to 72.

Buy Now
Exam Code: ST0-250
Exam Name: SymantecMessaging Gateway10.5Technical Assessment
Last Update: Apr 21, 2024
Questions: 126
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99