Spring Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Proofpoint TPAD01 Threat Protection Administrator Exam Exam Practice Test

Page: 1 / 7
Total 72 questions

Threat Protection Administrator Exam Questions and Answers

Question 1

The Abuse Mailbox event source was working in Cloud Threat Protection, but is now showing red under status and is no longer processing emails. After editing the source and clicking “Validate Source,” you receive the error “Unable to validate mailbox.” What is the likely cause of this error?

Options:

A.

The email server that hosts the abuse mailbox is disconnected.

B.

There are no match conditions in workflows configured.

C.

Incorrect email address format.

D.

Alert linking has been disabled.

Question 2

What is the primary purpose of SPF in Email Authentication?

Options:

A.

It verifies the recipient is authorized to receive emails from the sender’s domain.

B.

It checks the sending IP address is authorized by the sender’s domain.

C.

It checks the digital signature in the message header is valid and from that domain.

D.

It inserts a header containing email authentication results and signs it.

Question 3

If one of your corporate email accounts is sending excessive outbound emails, the Outbound Throttle feature can help. Which of the following is true regarding Outbound Throttle?

Options:

A.

After a threshold is reached, the messages are quarantined and automatically delivered at a later, less busy time.

B.

It automatically warns corporate users who are sending too many emails so they can reduce the load.

C.

The protection server automatically calculates server load and allows excessive emails to be delivered unfiltered.

D.

After a threshold is reached, a warning email can be sent to the administrator with details of the sender’s account.

Question 4

When setting up an Import/Authentication Profile in PPS, which of the following is a required piece of information to connect to an LDAP server?

Options:

A.

POP3 server username

B.

LDAP server hostname or IP address

C.

SMTP server address

D.

IMAP server port number

Question 5

How does TAP’s Message Defense feature work for unknown attachments?

Options:

A.

It scans only PDF attachments for malware

B.

It automatically deletes all attachments from external senders

C.

It allows attachments through only if the sender is on a safelist

D.

It detonates suspicious attachments in a sandbox to analyze their behavior

Question 6

Which feature is commonly available to end users via the web interface?

Options:

A.

Viewing and releasing emails from the quarantine

B.

Configuring rules to send messages to folders in their inbox

C.

Configuring brand identity colors and images for messages

D.

Reading encrypted messages sent through PoD

Question 7

An inbound message matches the inbound_protected policy route and also the default spam policy. Which policy will be applied?

Options:

A.

Only the default policy will be applied.

B.

Only the inbound_protected policy will be applied.

C.

The inbound_protected and default policy will be applied to the message in that order.

D.

Neither policy will be applied because policy routes are mutually exclusive.

Question 8

Which feature on the Protection Server would you use to prevent Email Warning Tags being inserted into a trusted sender’s emails?

Options:

A.

Policy Routes

B.

SMTP Rate Control

C.

DMARC

D.

Quarantine

Question 9

In the mail route configuration shown, how does the Protection Server attempt delivery to example.com?

Options:

A.

It randomizes the listed destination MTAs for load balancing

B.

It always uses the lowest entry first, then retries upward

C.

It tries to connect to the destination MTAs starting at the top and working down the list

D.

It performs public MX lookup first and ignores the manually listed hosts

Question 10

What is the primary role of SMTP in the process of email communication?

Options:

A.

To transfer email messages from one mail server to another during delivery.

B.

To securely store email attachments within the mail processing system.

C.

To automatically encrypt emails before they are sent to the destination server.

D.

To manage the transmission of emails between user email clients and servers.

Question 11

You are using Smart Search within the PPS Admin UI to investigate the final disposition of a message. Smart Search shows the message is Quarantined/Discard to adqueue. How do you trace the message?

Options:

A.

Use the session ID (sid) to search

B.

Select Rule adqueue

C.

Use the message ID to search

D.

Use the message GUID to search

Question 12

Which of the following is the correct order for SMTP message reception?

Options:

A.

connection, helo, envelope sender, envelope recipient, message headers, message body

B.

helo, connection, envelope sender, envelope recipient, message headers, message body

C.

connection, helo, envelope recipient, envelope sender, message headers, message body

D.

helo, connection, envelope sender, message headers, envelope recipient, message body

Question 13

Which of the following is a common port used for SMTP connectivity?

Options:

A.

22

B.

443

C.

80

D.

25

Question 14

Which spam policy is applied to outbound messages?

Options:

A.

The spam policy set at the Organization level

B.

The spam policy set for the sender of the email

C.

The spam policy set for the recipient of the email

D.

The spam policy set at the Sub-Org level

Question 15

Which application do you use to update the SSO configuration for Federated Authentication for your Proofpoint Cloud Services, including TAP, Cloud Admin, and NPRE?

Options:

A.

Cloud Security Dashboard

B.

User Management Portal

C.

Cloud Admin Portal

D.

Unified Management Portal

Question 16

You log into the Protection Server and a rule you created yesterday is no longer enabled. Where can you find out what happened to the rule you created?

Options:

A.

Smart Search

B.

Audit Logs

C.

Alert Viewer

D.

Log Viewer

Question 17

When you are attempting to release a message from the quarantine folder, you have the three choices shown here. The option of Release Encrypted With Scan will do which of the following?

Question # 17

Options:

A.

Release the message to the user and deliver it encrypted.

B.

Resubmit the message to message defense and virus protection and release the message to the user.

C.

Encrypt the message and release the message to the user's digest.

D.

Resubmit the message to message defense and virus protection and release an encrypted message to the user.

Question 18

Which Email Firewall features should be used together to mitigate directory harvest attacks?

Options:

A.

Outbound Throttle

B.

SMTP Rate Control

C.

Dictionaries

D.

Bounce Management

E.

Recipient Verification

Question 19

What is the primary function of Cloud Threat Response (CTR)?

Options:

A.

To automate the containment and remediation of email threats

B.

To manually analyze every email before delivery

C.

To encrypt all emails before sending them to recipients

D.

To filter out spam emails before they reach users’ inboxes

Question 20

What option will release a quarantined message without further filtering?

Options:

A.

Redirect

B.

Release Without Scan

C.

Release Encrypted With Scan

D.

Release With Scan

Question 21

What is the primary purpose of the End User Web Interface in Proofpoint?

Options:

A.

To block all incoming emails automatically

B.

To allow users to manage their quarantined emails and email preferences

C.

To configure firewall settings and network security policies

D.

To send encrypted messages to external recipients

Page: 1 / 7
Total 72 questions