Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Proofpoint TPAD01 Threat Protection Administrator Exam Exam Practice Test

Demo: 21 questions
Total 72 questions

Threat Protection Administrator Exam Questions and Answers

Question 1

You are tasked with configuring outbound mail for an organization where an external domain has multiple MX records. Only one specific host is accepting mail. What is the best way to specify this specific hostname for outbound mail?

Options:

A.

Set the outbound mail route to point directly to the specific hostname within the Admin GUI.

B.

Configure the mail system to perform a DNS lookup and select one of the MX records.

C.

Set up an internal DNS record that points to the specific hostname for the external domain.

D.

Use a wildcard in the outbound mail configuration to send to any MX record in the Admin GUI.

Question 2

Which of the following are true regarding Email Warning Tags?

Pick the 2 correct responses below.

Options:

A.

Administrators can create new tag types and tag rules as needed.

B.

They are enabled in the individual recipient user’s settings.

C.

The tags can be edited to customize the color and text to meet requirements.

D.

By default, they apply to outbound traffic to external recipients only.

E.

The language used for the tag is based on the recipient user’s settings.

Question 3

What is the primary purpose of outbound mail filtering in Proofpoint?

Options:

A.

To ensure outbound emails are free from malware and spam

B.

To queue email messages until the recipient SMTP server is available

C.

To prevent users from sending too many messages in a short time period

D.

To encrypt all outbound emails based on policy routes

Question 4

As an administrator, you need to research why an email was sent instead of being blocked; where would you go in Cloud Admin to find which rule triggered the final disposition?

Options:

A.

Audit Logs

B.

Email Firewall

C.

MTA Logs

D.

Smart Search

Question 5

What is the primary purpose of the End User Web Interface in Proofpoint?

Options:

A.

To block all incoming emails automatically

B.

To allow users to manage their quarantined emails and email preferences

C.

To configure firewall settings and network security policies

D.

To send encrypted messages to external recipients

Question 6

An email message fails an SPF check; which of the following is a likely reason for this failure?

Options:

A.

The recipient’s email server does not support SPF.

B.

The email is being sent during peak traffic hours.

C.

The sending server’s IP address is not listed in the SPF record.

D.

The email was sent from a secure server.

Question 7

What does the default exestrip rule do?

Options:

A.

Quarantines the message and notifies the receiver that it has been quarantined

B.

Sends the message to the Message Defense module

C.

Deletes the listed attachments from the message and continues processing

D.

Deletes messages with executable attachments

Question 8

You need to use CTR to manually quarantine a suspicious email that has been delivered. What is the first step you should take?

Options:

A.

Select the “Quarantine” option directly from the inbox

B.

Forward the email as an attachment to an abuse mailbox for further investigation

C.

Log into the mail server and manually delete the email as quickly as possible

D.

Find the delivered message in Smart Search

Question 9

Review the filter log exhibit.

What two actions have taken place in the filter logs for this message?

What the exhibit shows clearly:

- URL Defense processing is present in the log

- A spam-related action/flag is present

Options:

A.

URL defense is blocking the message due to a malicious link.

B.

The email gets rejected due to excessive processing time.

C.

The message has been flagged as SPAM.

D.

The connection times out and is dropped by the sender.

E.

The message was rejected due to its size.

Question 10

In the context of spam detection, what is the primary function of Proofpoint Dynamic Reputation (PDR)?

Options:

A.

To provide training for users on how to identify spam.

B.

To filter emails based on user-defined rules.

C.

To assess the sending MTA’s reputation based on its IP address.

D.

To analyze email content for spam keywords.

Question 11

Refer to the exhibit below to see the interface used in this scenario.

An email arrives inbound to the protection server, it is going to a single recipient and belongs

to the legal and default_inbound policy routes.

Which of the following is true regarding the virus policies?

Options:

A.

The outbound policy is applied first and then the default policy will be applied.

B.

The default policy is applied first and then the inbound_protected policy is applied.

C.

The inbound_protected and default policy will be applied to the message in that order.

D.

The inbound_protected policy will apply to the message. All other policies will be ignored.

Question 12

Which feature is commonly available to end users via the web interface?

Options:

A.

Viewing and releasing emails from the quarantine

B.

Configuring rules to send messages to folders in their inbox

C.

Configuring brand identity colors and images for messages

D.

Reading encrypted messages sent through PoD

Question 13

When TLS is enabled, what is the default behavior regarding TLS on the Protection Server?

Options:

A.

When TLS is attempted and fails, communication occurs over plain HTTP.

B.

TLS is only used for internal communications within the server.

C.

When TLS is attempted and fails, the message is rejected.

D.

TLS is opportunistic for all SMTP communications.

Question 14

If one of your corporate email accounts is sending excessive outbound emails, the Outbound Throttle feature can help. Which of the following is true regarding Outbound Throttle?

Options:

A.

After a threshold is reached, the messages are quarantined and automatically delivered at a later, less busy time.

B.

It automatically warns corporate users who are sending too many emails so they can reduce the load.

C.

The protection server automatically calculates server load and allows excessive emails to be delivered unfiltered.

D.

After a threshold is reached, a warning email can be sent to the administrator with details of the sender’s account.

Question 15

When employees at your company change their name, their email address also changes. To ensure that the user import process associates the new email addresses with the existing users, how should you configure the primary key?

Options:

A.

Set the primary key to the user’s full name.

B.

Keep the old email address as the primary key.

C.

Use the updated email address as the primary key.

D.

Change the primary key to match the uid attribute.

Question 16

Which spam policy is applied to outbound messages?

Options:

A.

The spam policy set at the Organization level

B.

The spam policy set for the sender of the email

C.

The spam policy set for the recipient of the email

D.

The spam policy set at the Sub-Org level

Question 17

When you are attempting to release a message from the quarantine folder, you have the three choices shown here. The option of Release Encrypted With Scan will do which of the following?

Options:

A.

Release the message to the user and deliver it encrypted.

B.

Resubmit the message to message defense and virus protection and release the message to the user.

C.

Encrypt the message and release the message to the user's digest.

D.

Resubmit the message to message defense and virus protection and release an encrypted message to the user.

Question 18

You are using Smart Search within the PPS Admin UI to investigate the final disposition of a message. Smart Search shows the message is Quarantined/Discard to adqueue. How do you trace the message?

Options:

A.

Use the session ID (sid) to search

B.

Select Rule adqueue

C.

Use the message ID to search

D.

Use the message GUID to search

Question 19

Which application do you use to update the SSO configuration for Federated Authentication for your Proofpoint Cloud Services, including TAP, Cloud Admin, and NPRE?

Options:

A.

Cloud Security Dashboard

B.

User Management Portal

C.

Cloud Admin Portal

D.

Unified Management Portal

Question 20

Review the filter log exhibit.

What is happening to this inbound email?

Options:

A.

The connection dropped before the message could be sent.

B.

The email was sent after being filtered with no issues.

C.

The email was rejected due to its excessive size.

D.

The email was rejected due to excessive processing time.

Question 21

How does TAP’s Message Defense feature work for unknown attachments?

Options:

A.

It scans only PDF attachments for malware

B.

It automatically deletes all attachments from external senders

C.

It allows attachments through only if the sender is on a safelist

D.

It detonates suspicious attachments in a sandbox to analyze their behavior

Demo: 21 questions
Total 72 questions