Symantec 250-556 Questions & Answers

Full Version: 134 Q&A


Latest 250-556 Exam Questions and Practice Tests 2024 - Killexams.com

Latest 250-556 Practice Tests with Actual Questions


Get Complete pool of questions with Premium PDF and Test Engine


Exam Code : 250-556
Exam Name : Administration of Symantec ProxySG 6.7
Vendor Name :
"Symantec"








250-556 Dumps

250-556 Braindumps

250-556 Real Questions

250-556 Practice Test

250-556 Actual Questions


killexams.com


Symantec


250-556


Administration of Symantec ProxySG 6.7


https://killexams.com/pass4sure/exam-detail/250-556


Question: 1


When will a policy trace report a rule processing result of âN/Aâ? (Choose the best answer.)


  1. When the layer containing the rule is disabled

  2. When the rule is not reached during evaluation

  3. When the rule makes no sense for the specific transaction being processed

  4. When the rule is contradicted by a subsequent rule




Answer: C
Question: 2

What is a component of a proxy service listener? (Choose the best answer.)


  1. Encryption hash

  2. Source IP address

  3. Proxy mode

  4. Proxy type




Answer: B
Question: 3

Which service is provided by the ProxySG? (Choose the best answer.)


  1. Virus scanning

  2. Strong authentication

  3. Edge routing

  4. Sandboxing




Answer: B
Question: 4

Which best describes BCAAA? (Choose the best answer.)


  1. An intermediary between the ProxySG and an authentication server

  2. An application that sends sysinfo snapshots to Symantec support

  3. Symantecâs internal authorization and authentication service

  4. A utility that allows a direct connection between the ProxySG and an authentication domain.




Answer: A
Question: 5

Which two (2) categories of traffic are typically left encrypted? (Choose two.)


  1. Gambling

  2. News Media

  3. Social Media

  4. Financial Services

  5. Health

    Answer: A,D,E
    Question: 6

When must BCAAA be used? (Choose the best answer.)


  1. When an administrator needs to establish more than one Schannel to increase performance.

  2. When more than one ProxySG are deployed

  3. When the ProxySG is unable to directly utilize APIs that require traditional operating systems.

  4. When Basic credentials are used




Answer: C
Question: 7

Which type of object is a Notify User object in the VPM? (Choose the best answer.)


  1. Destination

  2. Action

  3. Track

  4. Source




Answer: B
Question: 8

Which two (2) situations might require a reverse DNS lookup? (Choose two.)


  1. If the access log is enabled and a field in the access log requires a hostname

  2. If both the primary and alternate forward DNS servers go down

  3. If primary authentication fails

  4. If a policy trigger event requires it

  5. If a forward DNS lookup fails




Answer: A,D
Question: 9

What is the default TCP port for HTTP? (Choose the best answer.)


  1. 20

  2. 443

  3. 80

  4. 43




Answer: C
Question: 10

What is typically the biggest load on a CPU when managing encrypted traffic? (Choose the best answer.)

  1. Emulating certificates

  2. Using the SHA-2 hash function

  3. Using RSA encryption

  4. The need for redirection




Answer: A
Question: 11

How does an administrator create a single group in policy that includes multiple client addresses? (Choose the best answer.)


  1. Create a combined policy object.

  2. Include the addresses in a layer guard.

  3. This can only be done using CP

  4. Use a dedicated layer.




Answer: A
Question: 12

In which caching technique does the ProxySG open multiple server connections to retrieve objects referenced on a web page before the client actually issues the requests for those objects? (Choose the best answer.)


  1. Popularity contest

  2. Cost-based deletion

  3. Asynchronous adaptive refresh

  4. Pipelining




Answer: D
Question: 13

Which service setting determines whether the traffic is passed to the SSL proxy or the HTTP proxy when a browser is configured to use an explicit proxy connection to the ProxySG? (Choose the best answer.)


  1. Enable SSL/TLS

  2. Detect protocol

  3. Authenticate-401

  4. Forward client cert




Answer: B
Question: 14

Which two (2) locations is the WebFilter database stored in? (Choose two.)


  1. At several data centers around the world

  2. In the WebPulse data cache

  3. On clientsâ mobile devices

  4. On a properly licensed ProxySG

  5. Symantec Management Center




Answer: A,D
Question: 15

What should an administrator utilize in policies to specify which traffic should be decrypted? (Choose the best answer.)


  1. Listeners

  2. URL categories

  3. The SSL Proxy

  4. All proxy services




Answer: A
Question: 16

Which log format is associated with the main log facility by default? (Choose the best answer.)


  1. http

  2. elff

  3. main

  4. bcreportermain_v1




Answer: D
Question: 17

Which two (2) errors are the most common certificate errors? (Choose two.)


  1. The server does NOT recognize the ProxyS

  2. The client does NOT trust the server.

  3. The client does NOT trust the ProxyS

  4. The ProxySG does NOT trust the server.

  5. The server does NOT trust the client.




Answer: A,B,C
Question: 18

How does the ProxySG handle a rule that contains a syntax error when the ProxySG processes installed policy as part of a client transaction? (Choose the best answer.)


  1. The ProxySG changes the transaction status to Deny and makes an entry in the event log

  2. The ProxySG stops processing of the layer containing the rule and continues with the next layer, if any

  3. This is NOT possible; rules with syntax errors are unable to be installed.

  4. The ProxySG skips the rule and does NOT change the accept or deny status of the transaction




Answer: A
Question: 19

How can an administrator determine the serial number of the ProxySG in the Management Console? (Choose the best answer.)


  1. This information is not visible from the Management Console

  2. Go to Statistics > Advanced

  3. Go to Configuration > Network

  4. The serial number is contained in the top right Management Console banner




Answer: D
Question: 20

Which kind of authentication credentials might Schannel congestion in IWA direct realms be an issue with? (Choose the best answer.)


  1. NTLM

  2. Surrogate credentials

  3. Kerberos

  4. Basic




Answer: B


User: Dhia*****

The bundle of Killexams.com questions and answers provided me with an awesome result. The questions were correct, and I was able to answer most of them during the exam. After passing, I recommended Killexams.com to my colleagues, and they also passed their exams with ease. I have not heard a single negative review of Killexams, which makes it the best IT training you can find online.
User: Doreen*****

I was recommended to use Killexams practice tests as a reference for my exam, and they did an excellent job. The short-duration answers were easy to understand, and I scored 80% marks by dealing with 98% of the questions. Despite not contributing much time to prepare for this exam, I found it to be a noteworthy challenge for my IT profession.
User: Sidney*****

I failed my exam initially and was very disappointed. Fortunately, I came across the platform, which provided me with the practice tests I needed to pass the exam quickly. I bought the guidance package containing questions, answers, and exam simulator, prepared for the exam, and scored high marks. Thanks to the platform crew for their excellent support.
User: Vera*****

From my personal experience, I can say that answering the practice papers one after the other can help you crack the exam. killexams.com has an effective practice test that is very useful and helpful. I want to thank the Killexams team for creating such a great resource.
User: Pyotr*****

With the help of killexams.com, you can easily stay on top of your game. The products are designed to assist all students, and I personally benefited from the 250-556 exam guide. It helped me understand all the essential standards required for certification, and I scored an impressive 90% with the help of the 250-556 exam engine. I am grateful to the team at killexams.com for their excellent support.

Features of iPass4sure 250-556 Exam

  • Files: PDF / Test Engine
  • Premium Access
  • Online Test Engine
  • Instant download Access
  • Comprehensive Q&A
  • Success Rate
  • Real Questions
  • Updated Regularly
  • Portable Files
  • Unlimited Download
  • 100% Secured
  • Confidentiality: 100%
  • Success Guarantee: 100%
  • Any Hidden Cost: $0.00
  • Auto Recharge: No
  • Updates Intimation: by Email
  • Technical Support: Free
  • PDF Compatibility: Windows, Android, iOS, Linux
  • Test Engine Compatibility: Mac / Windows / Android / iOS / Linux

Premium PDF with 134 Q&A

Get Full Version

All Symantec Exams

Symantec Exams

Certification and Entry Test Exams

Complete exam list