Certification Practice Test | PDF Questions | Actual Questions | Test Engine | Pass4Sure
250-556 : Administration of Symantec ProxySG 6.7 Exam
Symantec 250-556 Questions & Answers
Full Version: 134 Q&A
Latest 250-556 Practice Tests with Actual Questions
Get Complete pool of questions with Premium PDF and Test Engine
Exam Code : 250-556
Exam Name : Administration of Symantec ProxySG 6.7
Vendor Name :
"Symantec"
250-556 Dumps
250-556 Braindumps
250-556 Real Questions
250-556 Practice Test
250-556 Actual Questions
killexams.com
Symantec
250-556
Administration of Symantec ProxySG 6.7
https://killexams.com/pass4sure/exam-detail/250-556
Question: 1
When will a policy trace report a rule processing result of âN/Aâ? (Choose the best answer.)
When the layer containing the rule is disabled
When the rule is not reached during evaluation
When the rule makes no sense for the specific transaction being processed
When the rule is contradicted by a subsequent rule
Answer: C
Question: 2
What is a component of a proxy service listener? (Choose the best answer.)
Encryption hash
Source IP address
Proxy mode
Proxy type
Answer: B
Question: 3
Which service is provided by the ProxySG? (Choose the best answer.)
Virus scanning
Strong authentication
Edge routing
Sandboxing
Answer: B
Question: 4
Which best describes BCAAA? (Choose the best answer.)
An intermediary between the ProxySG and an authentication server
An application that sends sysinfo snapshots to Symantec support
Symantecâs internal authorization and authentication service
A utility that allows a direct connection between the ProxySG and an authentication domain.
Answer: A
Question: 5
Which two (2) categories of traffic are typically left encrypted? (Choose two.)
Gambling
News Media
Social Media
Financial Services
Health
Answer: A,D,E
Question: 6
When must BCAAA be used? (Choose the best answer.)
When an administrator needs to establish more than one Schannel to increase performance.
When more than one ProxySG are deployed
When the ProxySG is unable to directly utilize APIs that require traditional operating systems.
When Basic credentials are used
Answer: C
Question: 7
Which type of object is a Notify User object in the VPM? (Choose the best answer.)
Destination
Action
Track
Source
Answer: B
Question: 8
Which two (2) situations might require a reverse DNS lookup? (Choose two.)
If the access log is enabled and a field in the access log requires a hostname
If both the primary and alternate forward DNS servers go down
If primary authentication fails
If a policy trigger event requires it
If a forward DNS lookup fails
Answer: A,D
Question: 9
What is the default TCP port for HTTP? (Choose the best answer.)
20
443
80
43
Answer: C
Question: 10
What is typically the biggest load on a CPU when managing encrypted traffic? (Choose the best answer.)
Emulating certificates
Using the SHA-2 hash function
Using RSA encryption
The need for redirection
Answer: A
Question: 11
How does an administrator create a single group in policy that includes multiple client addresses? (Choose the best answer.)
Create a combined policy object.
Include the addresses in a layer guard.
This can only be done using CP
Use a dedicated layer.
Answer: A
Question: 12
In which caching technique does the ProxySG open multiple server connections to retrieve objects referenced on a web page before the client actually issues the requests for those objects? (Choose the best answer.)
Popularity contest
Cost-based deletion
Asynchronous adaptive refresh
Pipelining
Answer: D
Question: 13
Which service setting determines whether the traffic is passed to the SSL proxy or the HTTP proxy when a browser is configured to use an explicit proxy connection to the ProxySG? (Choose the best answer.)
Enable SSL/TLS
Detect protocol
Authenticate-401
Forward client cert
Answer: B
Question: 14
Which two (2) locations is the WebFilter database stored in? (Choose two.)
At several data centers around the world
In the WebPulse data cache
On clientsâ mobile devices
On a properly licensed ProxySG
Symantec Management Center
Answer: A,D
Question: 15
What should an administrator utilize in policies to specify which traffic should be decrypted? (Choose the best answer.)
Listeners
URL categories
The SSL Proxy
All proxy services
Answer: A
Question: 16
Which log format is associated with the main log facility by default? (Choose the best answer.)
http
elff
main
bcreportermain_v1
Answer: D
Question: 17
Which two (2) errors are the most common certificate errors? (Choose two.)
The server does NOT recognize the ProxyS
The client does NOT trust the server.
The client does NOT trust the ProxyS
The ProxySG does NOT trust the server.
The server does NOT trust the client.
Answer: A,B,C
Question: 18
How does the ProxySG handle a rule that contains a syntax error when the ProxySG processes installed policy as part of a client transaction? (Choose the best answer.)
The ProxySG changes the transaction status to Deny and makes an entry in the event log
The ProxySG stops processing of the layer containing the rule and continues with the next layer, if any
This is NOT possible; rules with syntax errors are unable to be installed.
The ProxySG skips the rule and does NOT change the accept or deny status of the transaction
Answer: A
Question: 19
How can an administrator determine the serial number of the ProxySG in the Management Console? (Choose the best answer.)
This information is not visible from the Management Console
Go to Statistics > Advanced
Go to Configuration > Network
The serial number is contained in the top right Management Console banner
Answer: D
Question: 20
Which kind of authentication credentials might Schannel congestion in IWA direct realms be an issue with? (Choose the best answer.)
NTLM
Surrogate credentials
Kerberos
Basic
Answer: B
User: Khabib***** I was pleasantly surprised to achieve a score of 86% in the 250-556 exam, which was beyond my expectations. While I did encounter some difficult themes, I found that the Killexams.com practice tests provided a solid foundation to understand the complex concepts. The preparation material was helpful and accurate, which helped me to overcome my initial problems. |
User: Michael***** I am confident in recommending Killexams.com 250-556 questions, answers, and exam simulator to anyone who is preparing for the 250-556 exam. It is the most updated preparation information available online, covering the complete 250-556 exam. The questions are updated and correct, and I did not have any trouble during the exam, earning good marks. Killexams.com is a reliable source for exam preparation. |
User: Onya***** In conclusion, the killexams.com Questions and Answers practice test, as well as the 250-556 exam simulator, were instrumental in my success. The material helped me to identify and address my weaknesses, enabling me to spend enough time preparing for the exam. I wish the killexams.com team all the best in their future endeavors. |
User: Ruzha***** In conclusion, I am extremely satisfied with the quality of the resources provided by Killexams.com. Their questions and answers helped me achieve success on the 250-556 exam, and I highly recommend their services to anyone looking to pursue a certification in the future. |
User: Alejandro***** Thanks to killexams.com 250-556 practice tests, I scored 100% on the exam today. I never thought it was possible, but their material had me fully prepared. The questions provided covered all the topics, and I was pleasantly surprised to see the same questions on the actual exam. I highly recommend using Killexams for exam preparation. |
Features of iPass4sure 250-556 Exam
- Files: PDF / Test Engine
- Premium Access
- Online Test Engine
- Instant download Access
- Comprehensive Q&A
- Success Rate
- Real Questions
- Updated Regularly
- Portable Files
- Unlimited Download
- 100% Secured
- Confidentiality: 100%
- Success Guarantee: 100%
- Any Hidden Cost: $0.00
- Auto Recharge: No
- Updates Intimation: by Email
- Technical Support: Free
- PDF Compatibility: Windows, Android, iOS, Linux
- Test Engine Compatibility: Mac / Windows / Android / iOS / Linux
Premium PDF with 134 Q&A
Get Full VersionAll Symantec Exams
Symantec ExamsCertification and Entry Test Exams
Complete exam list