An organization wants to specify quarantine or reject actions for messages that fail validation. They also want feedback from receiving servers to analyze failed email attempts. Which approach is most appropriate for them to meet these objectives?
Publish a record in DNS detailing enforcement instructions and contact addresses for feedback
Set up a script on a proxy server to block messages that contain suspicious attachments
Configure a remote execution tool that updates cryptographic keys for each outbound message
Use a record with basic alignment referencing a decoy mail server
The correct method is to publish a record in DNS that outlines enforcement actions and designates where to send reports. This ensures that unauthorized messages are appropriately handled by major providers and that administrators receive data on messages that fail checks. A record with only alignment references lacks clear handling instructions or reporting, a script set up on a proxy ignores inbound authentication standards, and a remote execution tool that updates keys does not provide enforcement and reporting policies for incoming messages.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What type of record is published in DNS to enforce email policies and collect feedback?
Open an interactive chat with Bash
How does DMARC ensure unauthorized emails are handled appropriately?
Open an interactive chat with Bash
What information is included in the reports generated by DMARC?