ST0-250 Free Dumps Study Materials
Question 5: An administrator needs to determine whether a sending MTA is being throttled by Symantec
Messaging Gateway 10.5. Where is this information located?
A. Reputation Summary report
B. IP reputation lookup table
C. SMTP server logs
D. message audit logs
Correct Answer: B
6. After a configurable period of time, a suspect virus is released from the Suspect Virus
Quarantine. What happens to it next?
A. An alert is sent to the email administrator.
B. The attachment is removed and the original message is delivered to the recipient.
C. It is rescanned.
D. It is moved to quarantine.
Correct Answer: C
7. What is the current name of the LDAP synchronization technology used within the Symantec
Messaging Gateway?
A. Dynamic Data Cache
B. Directory Data Service
C. Active Directory
D. Domain Controller Interface (DCInterface)
Correct Answer: B
8. If recipient validation is configured properly, which SMTP response level is given to messages
that fail recipient validation queries at connect time?
A. 3xx - Service unavailable
B. 4xx - Temporary delivery failure
C. 5xx - Permanent delivery failure
D. 6xx - Rejected validation failure
Correct Answer: C
9. How should an administrator stop inbound mail using the command line interface (CLI)?
A. use mta-control
B. use mta-stop
C. use mail-control
D. use mail-stop
Correct Answer: A
10. Which additional Email Reports Data collection must be enabled to track Top Probe Accounts
via reports?
A. Spam and Unwanted Mail
B. Submissions
C. Sender IP connections
D. Invalid Recipients
Correct Answer: D
11. Which two statistics can the administrator view regarding the custom anti-spam rulesets?
(Select two.)
A. the "top-submitters" of missed spam or false positive detections
B. the "top submitters" of messages that are not valid and did not generate a custom rule
C. how many emails have been submitted for custom antispam rules
D. the effectiveness of the custom antispam rulesets compared to Symantec's rulesets
E. the top senders of messages detected by custon antispam rulesets
Correct Answer: A,C
12. What two actions can allowed end-users do to submit samples to Symantec and have custom
anti-spam rules created? (Select two.)
A. submit a sample to Symantec using the Email Submission Client
B. flag messages in their web-based SMG quarantine page as being spam and submitting the results
C. forward spam samples to
[email protected] with a subject of "MISSED SPAM"
D. move the message into the included "Junk E-mail" folder available in Outlook
E. submit a sample to Symantec using the Email Submission Client available for Lotus Domino
Correct Answer: A,B
13. A company uses multiple control centers. What must be done to ensure legitimate NDRs are
recognized by Bounce Attack Prevention across all scanners?
A. configure the same seed value on each control center
B. configure the same administrator email address across both control centers
C. configure the same seed value on each scanner
D. configure both control centers with the same internal email hosts
Correct Answer: A
14. An organization would like to participate in the Symantec Probe Network without having to
manually create decoy email accounts. The organization wants to make sure that the addresses that
participate in the Symantec Probe Network are currently receiving email. Which directory data
source function should be enabled to help in this situation?
A. recipient validation
B. address resolution
C. SMTP authentication
D. LDAP routing
Correct Answer: A
15. What is required before attempting installation of the Symantec Messaging Gateway 10.5
appliance?
A. console access to the appliance
B. DVD-ROM drive listed on hardware compatibility list
C. valid license file
D. machine account created in Active Directory
Correct Answer: A