A. Once a week
B. The frequency is configured by the administrator
C. Every other day
D. Every day
A. Malicious
B. Bulk
C. Unsolicited
D. Unwanted
A. Outbound harvesting
B. Manual entry
C. Address Synchronization Tool (Schemus)
D. Exchange Journaling
A. Executive attack
B. Whaling attack
C. Business attack
D. Shark attack
A. USB drives
B. DNS Poisoning
C. Website injections
D. Email
A. When a website followed from an email link contains pornography
B. When a website followed from an email link contains malware
C. When a website followed from an email link contains specific inappropriate content
D. When a website followed from an email link contains large video files
A. Malware Alert Notification email
B. Quarantine Alert Notification email
C. Cynic Alert Notification email
D. Attack Alert Notification email