Barracuda Impersonation Protection
Barracuda Impersonation Protection
... identifies users that are potential targets for spear phishing attacks.
False
True
Administrators can configure "allowed senders" which are exempted from Impersonation
Protection mechanisms.
True
False
You can change how Impersonation Protection handles detected spearphishing attacks.
False, detected spearphishing attacks will be moved to the recipient's Junk Email folder.
True, there are different options on how Impersonation Protection will handle detected
spearphishing attacks.
What tasks are NOT possible when creating an account takeover incident?
Impersonation Protection provides a list of tasks you need to perform on Microsoft 365 to secure the
account.
The identified malicious emails can be removed from the user's mailboxes.
The identified malicious emails can be copied to the user's Junk folder.
...PowerShell.
...API.
...mail journaling.
Which of the following are NOT indicators of a positive result for spearphishing analysis on an
email?
Confidence
Key Indicators
Intent Score
New answer...
...provides insights into impersonation and Business Email Compromise (BEC) attacks.
Analysis provided for each spearphishing attack detected by Impersonation Protection provides
the type of attack (for example, Extortion). Which heading in the alert provides these details?
Confidence
Determination
Severity
Attackers can impersonate someone within the company using the fraudulent domain.
Attackers can log into the mail accounts of the domains users.
Senders can be allowlisted so they will not be included in Impersonation Protection coverage.
True
False
False
True
Account takeover.
Network attacks.
Spearphishing attacks.
Impersonation Protection's Account Takeover Protection Alerts are triggered by every sign-in of
your Microsoft 365 users.
True
False
An administrator can manually create a new Incident from within any reporting screen in the
Account Takeover section of the Impersonation Protection user interface.
True
False
If your Microsoft 365 tenant is routing mail via Email Gateway Defense, an email triggering an
alert in Impersonation Protection also triggers a marker in Email Gateway Defense Message
Log.
False
True
By looking at the normal communication patterns within your organization, and checking if this
...initiate transactions.
Account Takeover Protection is the part of Impersonation Protection that can collect and
combine information regarding...
... is used to quarantine mail and force users to reset their passwords.
... shows phishing threats already received by the users in your Microsoft 365 tenant.
Spearphishing alerts can be used to search for threats which may already exist in your tenant,
using interconnectivity with Incident Response.
False
True
Filter all email for spam and malware and block these before delivery.
The maximum reporting period for sign-ins to the Microsoft 365 tenant is...
...1 month
...7 days
...24 hours
...96 hours
Administrators can opt to leave emails which trigger spearphishing alerts in their users' inboxes.
True
False
The Impersonation Protection Real Time AI protects against which of the following?
Wrong answer
Spearphishing