An organization wants to specify quarantine or reject actions for messages that fail validation. They also want feedback from receiving servers to analyze failed email attempts. Which approach is most appropriate for them to meet these objectives?
Configure a remote execution tool that updates cryptographic keys for each outbound message
Set up a script on a proxy server to block messages that contain suspicious attachments
Use a record with basic alignment referencing a decoy mail server
Publish a record in DNS detailing enforcement instructions and contact addresses for feedback
The correct method is to publish a record in DNS that outlines enforcement actions and designates where to send reports. This ensures that unauthorized messages are appropriately handled by major providers and that administrators receive data on messages that fail checks. A record with only alignment references lacks clear handling instructions or reporting, a script set up on a proxy ignores inbound authentication standards, and a remote execution tool that updates keys does not provide enforcement and reporting policies for incoming messages.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What kind of record is published in DNS for enforcement instructions and feedback in email validation?
Open an interactive chat with Bash
What are SPF and DKIM, and how do they work with DMARC?
Open an interactive chat with Bash
How does feedback reporting in DMARC help organizations improve email security?