250-556 Dumps 250-556 Braindumps 250-556 Real Questions 250-556 Practice Test 250-556 Actual Questions Symantec 250-556 Administration of Symantec ProxySG 6.7 https://killexams.com/pass4sure/exam-detail/250-556 Question: 1 When will a policy trace report a rule processing result of âN/Aâ? (Choose the best answer.) A. When the layer containing the rule is disabled B. When the rule is not reached during evaluation C. When the rule makes no sense for the specific transaction being processed D. When the rule is contradicted by a subsequent rule Answer: C Question: 2 What is a component of a proxy service listener? (Choose the best answer.) A. Encryption hash B. Source IP address C. Proxy mode D. Proxy type Answer: B Question: 3 Which service is provided by the ProxySG? (Choose the best answer.) A. Virus scanning B. Strong authentication C. Edge routing D. Sandboxing Answer: B Question: 4 Which best describes BCAAA? (Choose the best answer.) A. An intermediary between the ProxySG and an authentication server B. An application that sends sysinfo snapshots to Symantec support C. Symantecâs internal authorization and authentication service D. A utility that allows a direct connection between the ProxySG and an authentication domain. Answer: A Question: 5 Which two (2) categories of traffic are typically left encrypted? (Choose two.) A. Gambling B. News Media C. Social Media D. Financial Services E. Health Answer: A,D,E Question: 6 When must BCAAA be used? (Choose the best answer.) A. When an administrator needs to establish more than one Schannel to increase performance. B. When more than one ProxySG are deployed C. When the ProxySG is unable to directly utilize APIs that require traditional operating systems. D. When Basic credentials are used Answer: C Question: 7 Which type of object is a Notify User object in the VPM? (Choose the best answer.) A. Destination B. Action C. Track D. Source Answer: B Question: 8 Which two (2) situations might require a reverse DNS lookup? (Choose two.) A. If the access log is enabled and a field in the access log requires a hostname B. If both the primary and alternate forward DNS servers go down C. If primary authentication fails D. If a policy trigger event requires it E. If a forward DNS lookup fails Answer: A,D Question: 9 What is the default TCP port for HTTP? (Choose the best answer.) A. 20 B. 443 C. 80 D. 43 Answer: C Question: 10 What is typically the biggest load on a CPU when managing encrypted traffic? (Choose the best answer.) A. Emulating certificates B. Using the SHA-2 hash function C. Using RSA encryption D. The need for redirection Answer: A Question: 11 How does an administrator create a single group in policy that includes multiple client addresses? (Choose the best answer.) A. Create a combined policy object. B. Include the addresses in a layer guard. C. This can only be done using CP D. Use a dedicated layer. Answer: A Question: 12 In which caching technique does the ProxySG open multiple server connections to retrieve objects referenced on a web page before the client actually issues the requests for those objects? (Choose the best answer.) A. Popularity contest B. Cost-based deletion C. Asynchronous adaptive refresh D. Pipelining Answer: D Question: 13 Which service setting determines whether the traffic is passed to the SSL proxy or the HTTP proxy when a browser is configured to use an explicit proxy connection to the ProxySG? (Choose the best answer.) A. Enable SSL/TLS B. Detect protocol C. Authenticate-401 D. Forward client cert Answer: B Question: 14 Which two (2) locations is the WebFilter database stored in? (Choose two.) A. At several data centers around the world B. In the WebPulse data cache C. On clientsâ mobile devices D. On a properly licensed ProxySG E. Symantec Management Center Answer: A,D Question: 15 What should an administrator utilize in policies to specify which traffic should be decrypted? (Choose the best answer.) A. Listeners B. URL categories C. The SSL Proxy D. All proxy services Answer: A Question: 16 Which log format is associated with the main log facility by default? (Choose the best answer.) A. http B. elff C. main D. bcreportermain_v1 Answer: D Question: 17 Which two (2) errors are the most common certificate errors? (Choose two.) A. The server does NOT recognize the ProxyS B. The client does NOT trust the server. C. The client does NOT trust the ProxyS D. The ProxySG does NOT trust the server. E. The server does NOT trust the client. Answer: A,B,C Question: 18 How does the ProxySG handle a rule that contains a syntax error when the ProxySG processes installed policy as part of a client transaction? (Choose the best answer.) A. The ProxySG changes the transaction status to Deny and makes an entry in the event log B. The ProxySG stops processing of the layer containing the rule and continues with the next layer, if any C. This is NOT possible; rules with syntax errors are unable to be installed. D. The ProxySG skips the rule and does NOT change the accept or deny status of the transaction Answer: A Question: 19 How can an administrator determine the serial number of the ProxySG in the Management Console? (Choose the best answer.) A. This information is not visible from the Management Console B. Go to Statistics > Advanced C. Go to Configuration > Network D. The serial number is contained in the top right Management Console banner Answer: D Question: 20 Which kind of authentication credentials might Schannel congestion in IWA direct realms be an issue with? (Choose the best answer.) A. NTLM B. Surrogate credentials C. Kerberos D. Basic Answer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