Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What action does Proofpoint Collab Protection take when a malicious URL is detected?

A.

Sends an alert to the user’s manager.

B.

Encrypts the browser session.

C.

Automatically deletes the URL from the system.

D.

Redirects the browser to a block page.

Exhibit:

Which column indicates the number of users targeted by a malicious campaign or threat?

A.

Highlighted

B.

Intended

C.

At Risk

D.

Impacted

Evidence of an attack is no longer present due to a scheduled data purge. What would be the appropriate recommendation?

A.

Report the incident to the appropriate authorities for further investigation.

B.

Ignore the deletion of evidence as it cannot be recovered or used for any legal actions.

C.

Maintain the current data retention policy because it has been adequate until now.

D.

Re-evaluate the data retention policy to ensure evidence is adequately preserved.

What is the purpose of Smart Search?

A.

Trace and analyze information about files downloaded from a user's computer.

B.

Trace and analyze information about messages processed by the Proofpoint Protection Server.

C.

Trace and analyze information about user clicks on external websites.

D.

Trace and analyze information about firewall breaches.

What are two unique benefits of submitting false positives via the support portal? (Select two.)

A.

Automatic correction to label the threat as a false positive

B.

Generating a complaint to the TAP product manager

C.

Human review of the false positive claim

D.

Feedback on the false positive submission

E.

Quick reputation check on the message contents

In which part of the SMTP conversation can threat actors spoof information to make the message look safe to the recipient?

A.

Body

B.

Envelope

C.

Connection

D.

Header

Which TAP condemnation results from an analysis of emails submitted via Proofpoint ZenGuide Report Suspicious (formerly PhishAlarm)?

A.

Anomalous Traffic Detection

B.

Proofpoint Threat Analyst

C.

End User via CLEAR

D.

Customer Administrator via Blocklist

What best describes the nature of the NIST incident response lifecycle?

A.

A cyclical process focused on continuous improvement.

B.

A linear process from detection to recovery.

C.

A reactive-only approach to cyber threats.

D.

A one-time checklist for handling incidents.

When filtering for threats on the TAP People page, which two filters have the highest chance of finding compromises? (Select two.)

A.

Exposure > Permitted Clicks

B.

Users > Locations

C.

Exposure > Delivered with Accessible Threat

D.

Threats > False Positives Only

E.

Users > VIP

Where can a user access “Smart Search”? (Select two.)

A.

Protection Server GUI and Email Protection (Cloud) Admin

B.

TAP Dashboard and TRAP Admin Console

C.

Nexus Cloud Risk Explorer and TAP Dashboard

D.

Protection Server GUI and Nexus Cloud Risk Explorer