Which command is used to collect the configuration and log files from the command line interface (CLI)?
A. diagnostics
B. mallog
C. collect-logs
D. cc-config
What is an advantage of Symantec Content Encryption over TLS encryption?
A. Ensures compliance with government-mandated regulations
B. TLS encryption provides better security than content encryption.
C. May be implemented without requiring SSL certificates for each scanner
D. Ensures secure end-to-end delivery of sensitive messages
Symantec Messaging Gateway 10.5 includes a policy-based encryption feature. How is this new feature licensed?
A. The license is included with Symantec Protection Suite.
B. The license is included with Symantec MessagingGateway 10.5.
C. The license is included with Symantec Content Encryption.
D. The license is available with a PGP Universal license.
Which log would an administrator access to determine why an email was deleted by the scanner?
A. Update.log
B. Message Audit logs
C. Admin Audit logs
D. Messaginglog.log
Which logs will help an administrator determine why antispam rules have failed to update?
A. Antispam Update logs
B. LiveUpdate logs
C. Conduit logs
D. Appliance syslog
Having received a targeted attack from a spoofed email domain, a company wants to take advantage of DKIM validation for inbound mail. The messaging administrator has enabled sender authentication and DKIM validation and now needs to configure a content filtering policy to quarantine any messages that fail. Which condition should be met for the content filtering policy to fire?
A. The envelope sender email address contains "dkim=fail".
B. The message header contains "dkim=fail".
C. The file metadata MIME type is "dkim=fail".
D. The text in the subject,body,or attachments contains "dkim=fail".
How does enabling and configuring sender authentication options in Symantec Messaging Gateway 10.5 help to protect against spam?
A. by protecting against messages sent from trusted partners
B. by protecting against messages sent using a Sendmail MTA
C. by protecting against messages with a forged message ID
D. by protecting against messages with forged sender domains
Which two functions of Symantec Messaging Gateway 10.5 can use information retrieved from a directory data source? (Select two.)
A. masquerading
B. routing
C. annotation
D. reputation
E. authentication
When configuring remote logging, where are the logs redirected?
A. The primary control center
B. Symantec System Incident Manager (SSIM)
C. Application Eventlog
D. syslog
Which two tasks can an end-user perform while logged in to the Control Center when authentication and address resolution are enabled? (Select two.)
A. configure personal suspect spam scoring
B. configure personal Good and Bad Sender lists
C. configure personal language preferences
D. configure personal content filtering policies
E. configure personal email digest preferences
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ST0-250 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.