Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Proofpoint > Threat Protection Analyst > TPAD01

TPAD01 Threat Protection Administrator Exam Question and Answers

Question # 4

When accessing Threat Response/TRAP, you are unable to edit workflows. What is the first thing you should do?

A.

Open a support case and request that the “Modify Workflows” license be enabled for your account

B.

Add a new workflow and make sure you are selected as the Workflow Owner

C.

Log out and log in to Threat Response with the “podadmin” account

D.

Check that your user account is assigned to the proper team or role

Full Access
Question # 5

In a scenario where multiple members of a distribution group attempt to release the same quarantined email message from the scheduled digest, what will happen?

A.

The system allows all users to release the message, but logs the events for security audits

B.

All members will successfully release the message without any errors

C.

The first user will release the message, while others will receive an error

D.

All users will receive a notification that the message cannot be released due to a system error

Full Access
Question # 6

Can a new email digest be generated for every email which enters quarantine?

A.

Yes, it can be configured to send immediate notifications.

B.

Yes, it can send notifications based on user preferences.

C.

No, it can only send daily summaries.

D.

No, the digest is generated by schedule, or manually.

Full Access
Question # 7

Review the filter log exhibit.

What two actions have taken place in the filter logs for this message?

What the exhibit shows clearly:

- URL Defense processing is present in the log

- A spam-related action/flag is present

A.

URL defense is blocking the message due to a malicious link.

B.

The email gets rejected due to excessive processing time.

C.

The message has been flagged as SPAM.

D.

The connection times out and is dropped by the sender.

E.

The message was rejected due to its size.

Full Access
Question # 8

Which URLs are valid entries for the configuration shown in the screenshot?

A.

http://www.example.com

and ftp://www.example.com

B.

www.example.com

and https://www.example.com

C.

example.com/mail and smtp://example.com

D.

mail.example.com:25 and file://example.com

Full Access
Question # 9

When employees at your company change their name, their email address also changes. To ensure that the user import process associates the new email addresses with the existing users, how should you configure the primary key?

A.

Set the primary key to the user’s full name.

B.

Keep the old email address as the primary key.

C.

Use the updated email address as the primary key.

D.

Change the primary key to match the uid attribute.

Full Access
Question # 10

You are configuring Proofpoint’s URL Rewrite feature for incoming emails. What is the primary purpose of this feature?

A.

To scan and rewrite URLs in emails.

B.

To enhance email delivery speed.

C.

To archive emails for later review.

D.

To block all emails containing links.

Full Access
Question # 11

Which of the following is required to configure an outbound mail route in the Proofpoint Protection Server?

Pick the 3 correct responses below.

A.

DKIM key records for the domain.

B.

Email authentication information for the domain.

C.

Destination / Error Message for the routed mail.

D.

Email domain to be routed.

E.

Mailer type that is utilized for the route.

F.

Domain administrator email address.

Full Access
Question # 12

What is the main purpose of the sendmail SMTP queue in a Proofpoint system?

A.

To hold email messages temporarily until they can be successfully delivered.

B.

To maintain a long-term archive of all incoming and outgoing email traffic.

C.

To automatically detect and remove spam messages from the email system.

D.

To process email attachments for potential malware and security threats.

Full Access
Question # 13

What does the default exestrip rule do?

A.

Quarantines the message and notifies the receiver that it has been quarantined

B.

Sends the message to the Message Defense module

C.

Deletes the listed attachments from the message and continues processing

D.

Deletes messages with executable attachments

Full Access
Question # 14

Refer to the exhibit to see the interface used in this scenario.

You can drag the divider between the question and the exhibit to the left to make the image larger.

Using those settings for URL Rewrite, which of the following will be rewritten?

Pick the 2 correct responses below.

A.

example.com

B.

www.example.com

C.

https://www.example.com

D.

10.1.1.1

E.

mail.example.com

Full Access
Question # 15

Which of the following are true regarding Email Warning Tags?

Pick the 2 correct responses below.

A.

Administrators can create new tag types and tag rules as needed.

B.

They are enabled in the individual recipient user’s settings.

C.

The tags can be edited to customize the color and text to meet requirements.

D.

By default, they apply to outbound traffic to external recipients only.

E.

The language used for the tag is based on the recipient user’s settings.

Full Access
Question # 16

As an administrator, you need to research why an email was sent instead of being blocked; where would you go in Cloud Admin to find which rule triggered the final disposition?

A.

Audit Logs

B.

Email Firewall

C.

MTA Logs

D.

Smart Search

Full Access
Question # 17

What is the difference between the Discard and Reject dispositions?

A.

Reject drops the email and informs the sender of the rejection.

B.

Discard temporarily rejects the email due to resource constraints.

C.

Reject drops the email without notifying the sender of the delivery failure.

D.

Discard drops the email and informs the sender of the rejection.

Full Access
Question # 18

When you are attempting to release a message from the quarantine folder, you have the three choices shown here. The option of Release Encrypted With Scan will do which of the following?

A.

Release the message to the user and deliver it encrypted.

B.

Resubmit the message to message defense and virus protection and release the message to the user.

C.

Encrypt the message and release the message to the user's digest.

D.

Resubmit the message to message defense and virus protection and release an encrypted message to the user.

Full Access
Question # 19

Based on the message details shown, which two findings are true for this email?

A.

URL Defense is blocking the message due to a malicious link, and the message has been flagged as spam

B.

The message passed all checks and was released automatically

C.

The message was blocked only because the sender was internal

D.

The attachment was stripped, but no URL issues or spam indicators were present

Full Access
Question # 20

Based on the message details shown, which two actions are available to the administrator for this message?

A.

Release the message without scan and disable TAP

B.

Resubmit the message to Message Defense and Virus Protection and release an encrypted message to the user

C.

Add the sender to the allow list and bypass quarantine permanently

D.

Forward the message externally and skip all further analysis

Full Access
Question # 21

You have just been licensed to export the Smart Search data from your PoD protection server in JSON format. Where would you create the API keys needed by your SIEM to ingest the JSON stream?

A.

Admin UI on port 10000 of the PoD

B.

The Threat Protection portal

C.

The web-based Admin Portal

D.

The web-based TAP Dashboard

Full Access