Proofpoint
TPAD01
Q1:
What are the three default methods available in Recipient Verification to verify that a recipient mailbox exists?
Pick the 3 correct responses below.
☐
A
Email the recipient☐
B
SMTP verification☐
C
LDAP verification☐
D
User Repository verification☐
E
CSV File verification☐
F
DNS verification
Proofpoint
TPAD01
Q2:
Which of the following are true regarding Email Warning Tags?
Pick the 2 correct responses below.
☐
A
Administrators can create new tag types and tag rules as needed.☐
B
They are enabled in the individual recipient user's settings.☐
C
The tags can be edited to customize the color and text to meet requirements.☐
D
By default, they apply to outbound traffic to external recipients only.☐
E
The language used for the tag is based on the recipient user's settings.
Proofpoint
TPAD01
Q3:
What option will release a quarantined message without further filtering?
○
A
Redirect○
B
Release Without Scan○
C
Release Encrypted With Scan○
D
Release With Scan
Proofpoint
TPAD01
Q4:
When reviewing the Audit Logs in the context of cluster monitoring, what type of information is primarily available?
○
A
Live performance statistics and current status of cluster node workloads○
B
Alerts triggered by excessive use of cluster resources or capacity limits○
C
Detailed system faults and warning messages from cluster operations○
D
Records of administrator access and changes made to cluster settings
Proofpoint
TPAD01
Q5:
In an Email Firewall Rule, the ''Stop Other Rules...'' disposition:
○
A
Sends the message to quarantine instead of applying further rules○
B
Stops processing a message in the same module once a condition is met○
C
Stops processing a message across all modules once a condition is met○
D
Silently discards the message if no other rules apply