What does the default exestrip rule do?
Answer : C
The correct answer is C. Deletes the listed attachments from the message and continues processing. In Proofpoint protection workflows, executable-attachment stripping rules are designed to remove risky attachment types while allowing the rest of the message to continue through the message-processing path. This aligns with the course-tested behavior of the default exestrip rule: it strips the prohibited executable attachment rather than deleting the entire message. Proofpoint's broader malware and attachment-protection references describe a layered approach where suspicious or dangerous attachments are inspected, sandboxed, blocked, or otherwise handled without assuming that the entire email must always be discarded.
That distinction matters operationally. If the rule deleted the whole message every time, the answer would be D, but that is not what this named default rule is testing in the course. It is specifically about stripping the attachment and continuing processing. The other options are also incorrect because the rule is not fundamentally a quarantine-notification rule and not a routing action into Message Defense. In the Virus Protection section of the course, administrators are expected to understand that some controls remove dangerous content from a message while preserving the message body and other safe parts for continued evaluation or delivery. Therefore, the verified and course-aligned answer is C.
Which of the following is the correct order for SMTP message reception?
Answer : A
The correct answer is A. connection, helo, envelope sender, envelope recipient, message headers, message body. Proofpoint's SMTP relay reference explains the SMTP exchange in the expected sequence: the connection is established first, then the sending server identifies itself with HELO/EHLO, then MAIL FROM specifies the envelope sender, then recipient commands define the destination, and finally the message content is transmitted. Separate Proofpoint material on email structure also distinguishes the envelope, headers, and body as distinct parts of an email.
This is foundational mail-flow knowledge in the Threat Protection Administrator course because many connection-level and policy decisions occur before the full body is even processed. Recipient verification, SMTP rate controls, and some anti-spam or anti-spoofing logic rely on understanding where in the SMTP conversation each data element appears. The distractor options mix up that sequence by placing HELO before the connection, reversing sender and recipient order, or moving headers before the recipient stage, all of which are inconsistent with standard SMTP message reception. Therefore, the correct sequence is connection first, then HELO/EHLO, followed by envelope sender, envelope recipient, and finally the message headers and body. That makes A the verified answer.
Which spam policy is applied to outbound messages?
Answer : C
The correct answer is C. The spam policy set for the recipient of the email. In the Threat Protection Administrator course, outbound spam handling is tied to how Proofpoint applies spam policy through its policy-selection logic, and the tested answer for this question is that the recipient's spam policy is the one used for outbound messages. Proofpoint's Spam Detection guidance shows that policy routing determines which spam policy is applied to a message, and the course uses that framework when distinguishing inbound and outbound policy behavior.
This question is easy to overthink because many administrators naturally assume outbound filtering should always be based on the sender's organization or sender identity alone. But the course's expected answer is specifically the recipient-associated policy. The distractors reflect other places where administrators commonly expect policy to come from, such as the organization level or sender level, but those are not the correct course answer for this item. The important takeaway is that Proofpoint's spam-policy application is governed by routing and message-processing logic, and the course tests that exact behavior rather than a generic assumption about outbound mail. Therefore, for this Proofpoint Threat Protection Administrator question, the verified answer remains C.
Smart Search has returned 13 results for a specific recipient address. You click on one of the messages in the Results list. Which of the following information is available for that message?
Answer : A
The correct answer is A. The Final Rule that gave the final disposition for the message. Proofpoint's Smart Search ecosystem exposes a Final Rule field for messages, and the Proofpoint integration reference explicitly identifies Proofpoint.SmartSearch.Final_Rule as the final rule of the email message. That matches the course wording exactly and confirms that this piece of information is available when examining a message record in Smart Search.
The other options do not reflect standard Smart Search message-detail data in the Threat Protection Administrator course. Smart Search is designed to show message-processing and disposition information, not endpoint-style telemetry such as the time a user opened and read a message or the client software version on the recipient device. Likewise, low-level SMTP port numbers for a session are not the key message-detail field being tested here. The course consistently teaches Smart Search as the place to determine what happened to a message, which rules fired, and what final action was taken.
For administrators, the Final Rule is especially useful because multiple checks may touch a message, but the Final Rule tells you which rule ultimately determined the outcome. That is why this is the correct answer to the question. Therefore, the verified answer is A.
Select from the following options, which are configurable in quarantine folder settings.
Pick the 3 correct responses below.
Answer : A, B, E
The correct answers are A. Folder disposition settings, B. Folder injection alerts, and E. Services whether to include the folder contents in End User Digests. In the Proofpoint Threat Protection Administrator course, quarantine folders are configurable objects with administrative controls that affect how messages are handled after landing in the folder and how users are notified about them. Publicly accessible course material and training references for quarantine management reflect settings around folder actions, alerting behavior, and digest inclusion, which align to these three choices.
The other options are not the intended configurable folder settings in this question. Safe and block lists are managed as separate spam-control constructs rather than as intrinsic per-folder settings in the tested course context. The rules that reference a quarantine folder are configured at the policy or module level, not as properties edited inside the folder settings themselves. The number of messages that can be viewed in the folder is likewise not one of the core quarantine-folder configuration settings taught in the course. In practice, administrators use quarantine folder settings to control the treatment and visibility of quarantined mail, including how the folder participates in digests sent to end users. Because this question tracks directly to the course's quarantine administration section, the correct verified combination is A, B, and E.
In the context of Proofpoint, what is an SMTP Profile?
Answer : C
The correct answer is C. A setting that defines email routing policies. In Proofpoint administration, SMTP-related profiles are used as configuration objects that shape how mail is handled in transport, including route behavior and SMTP service characteristics. The course question's correct answer aligns with the operational role of SMTP profiles in governing routing and transport behavior, not quarantine personalization or encryption-key generation. Proofpoint's general SMTP and relay documentation frames SMTP configuration around how messages are relayed, routed, and delivered between systems, which supports this answer. (proofpoint.com)
The incorrect options do not fit the function of an SMTP Profile. A block list of email addresses would be part of filtering or policy controls, not SMTP profile definition. A Proofpoint-generated encryption key belongs to cryptographic or secure message workflows, not to SMTP profile configuration. A user-defined quarantine setting is part of end-user or administrative quarantine handling and is unrelated to transport profile architecture. In the Threat Protection Administrator course, Mail Flow focuses heavily on routing, relay behavior, and delivery path control, and this question sits squarely in that domain. So when the course asks what an SMTP Profile is in Proofpoint, the best verified answer is that it is a setting that defines email routing policies. (proofpoint.com)
Review the filter log exhibit.

What is happening to this inbound email?
Answer : C
The correct answer is C. The email was rejected due to its excessive size.
From the filter-log exhibit, the key indicator is the rejection entry that shows a Message Size Violation response. That tells you the Protection Server accepted enough of the SMTP transaction to evaluate the message, but then rejected it because it exceeded the configured size threshold. In other words, this is not a transport drop, not a normal successful delivery, and not a timeout caused by lengthy processing. The decisive clue is the size-related rejection text in the log.
This kind of event belongs to the Mail Flow topic because it reflects SMTP-time handling and message acceptance controls. Proofpoint applies a series of processing steps as mail is received, including connection checks, MIME inspection, attachment evaluation, and policy enforcement. When the message exceeds the allowed size, the server returns a rejection tied to that violation instead of continuing with normal acceptance and delivery.
Why the other choices are incorrect:
A is wrong because the log does not indicate that the sender disconnected before the transaction could complete.
B is wrong because the message was not delivered successfully; it was explicitly rejected.
D is wrong because the evidence points to a size violation, not a processing-time threshold breach.
So the complete interpretation of the exhibit is that the inbound message was rejected because it was too large, which makes Answer C the verified course-aligned choice.