Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Proofpoint PPAN01 Certified Threat Protection Analyst Exam Exam Practice Test

Demo: 15 questions
Total 52 questions

Certified Threat Protection Analyst Exam Questions and Answers

Question 1

What is the purpose of Smart Search?

Options:

A.

Trace and analyze information about files downloaded from a user's computer.

B.

Trace and analyze information about messages processed by the Proofpoint Protection Server.

C.

Trace and analyze information about user clicks on external websites.

D.

Trace and analyze information about firewall breaches.

Question 2

Which activity is part of the Preparation phase in the NIST lifecycle?

Options:

A.

Restoring systems from backups.

B.

Documenting postmortem reports.

C.

Identifying compromised accounts.

D.

Conducting response drill scenarios.

Question 3

Based on the exhibit,

which user would most benefit from attending security awareness training based on their behavior?

Options:

A.

Logan Green

B.

Scarlett Wilson

C.

Emma Taylor

D.

Jacob Lewis

Question 4

Which TAP Reports tab provides a view of the distribution of threats against your organization, including quantity of messages, variation of threat campaigns seen, and the number of individual threats that weren’t part of a campaign?

Options:

A.

Landscape

B.

Objectives

C.

Effectiveness

D.

Organization

Question 5

What type of threat does the Cloud Security Report help identify in connected environments?

Options:

A.

Ransomware

B.

Account Takeover

C.

Malicious Insider

D.

Business Email Compromise

Question 6

At a minimum, which three people should attend a post-incident debrief? (Select three.)

Options:

A.

Incident managers and support staff that worked on this issue

B.

Human resources manager to manage the employee incident experience

C.

Problem manager responsible for root-cause analysis

D.

Security architect or CTO who is responsible for product or service redesign

E.

Users directly affected by the incident

F.

MFA administrator to implement any necessary changes

Question 7

An attacker registers a domain like “great-company.com” to impersonate “greatcompany.com.” What tactic is being used?

Options:

A.

Domain Hijacking

B.

Display Name Spoofing

C.

Lookalike Domain

D.

Subdomain Takeover

Question 8

What does a notification of “Cleared” mean when shown in the header of an individual threat tab?

Options:

A.

The threat has been detected but hasn’t been resolved yet.

B.

The threat has been successfully neutralized and no longer poses a risk.

C.

The threat has been identified but is not considered a priority for investigation.

D.

The threat has been temporarily contained but may still pose a risk.

Question 9

Exhibit:

What is indicated by the icon shown in the “Highlighted” column?

Options:

A.

The threat has been added to a custom blocklist.

B.

The threat has been reported as a false negative.

C.

The threat has been reported as a false positive.

D.

The threat has been cleared and considered safe.

Question 10

An analyst is reviewing the Threat Response Quarantines card for a message in TAP Dashboard, as shown in the exhibit.

Why might a message be flagged with status “unavailable”?

Options:

A.

The message was deleted from the mailbox before it could be quarantined.

B.

The message was automatically moved into a user-created folder for archiving.

C.

The message was delayed in delivery because of large attachment size.

D.

The message was marked as read by the user before it could be quarantined.

Question 11

Which filter category in the TAP Dashboard helps identify threats targeting VIPs or specific geographies?

Options:

A.

At Risk

B.

Targeted

C.

Impacted

D.

Highlighted

Question 12

Where can a user access “Smart Search”? (Select two.)

Options:

A.

Protection Server GUI and Email Protection (Cloud) Admin

B.

TAP Dashboard and TRAP Admin Console

C.

Nexus Cloud Risk Explorer and TAP Dashboard

D.

Protection Server GUI and Nexus Cloud Risk Explorer

Question 13

What action does Proofpoint Collab Protection take when a malicious URL is detected?

Options:

A.

Sends an alert to the user’s manager.

B.

Encrypts the browser session.

C.

Automatically deletes the URL from the system.

D.

Redirects the browser to a block page.

Question 14

An analyst has been tasked with providing a report that can be used to prioritise investigations based on a user's Attack Index score. Which report would be most suitable for this purpose?

Options:

A.

VIP Activity

B.

Top 10 Recipients

C.

Very Attacked People

D.

Top 10 Clickers

Question 15

As a security analyst, you need to update the TAP URL Defense Custom Blocklist. Which three entries are valid formats for the blocklist? (Select three.)

Options:

A.

http://www.example.com

B.

.xxx

C.

*.acme.org

D.

ftp://ftp.example.com

E.

example

F.

example.com

Demo: 15 questions
Total 52 questions