Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

250-556 Sample Questions Answers

Questions 4

Under which conditions does a policy-driven trace generate a trace? (Choose the best answer.)

Options:

A.

Only if a global policy trace is NOT enabled

B.

Only if the rule to which it is associated is triggered

C.

Only if a global policy trace fails

D.

Only if WebPulse is enabled

Buy Now
Questions 5

What must the virtual URL point to, when the ProxySG utilizes a virtual URL for user authentication in a transparent deployment? (Choose the best answer.)

Options:

A.

The IP address of the origin content server

B.

The IP address of the ProxySG

C.

A hostname that the user agent can DNS-resolve to an IP address

D.

The hostname of the origin content server

Buy Now
Questions 6

Which diagnostic tool allows an administrator to examine how the ProxySG has applied policy to a particular request? (Choose the best answer.)

Options:

A.

Policy/Statistics

B.

Policy monitor

C.

Policy tracing

D.

Packet capture

Buy Now
Questions 7

Which two (2) locations is the WebFilter database stored in? (Choose two.)

Options:

A.

At several data centers around the world

B.

In the WebPulse data cache

C.

On clients’ mobile devices

D.

On a properly licensed ProxySG

E.

Symantec Management Center

Buy Now
Questions 8

Where does ProxySG object caching usually result in the most bandwidth savings? (Choose the best answer.)

Options:

A.

On the server side

B.

On the ProxySG

C.

On the client side

D.

On the enterprise WAN

Buy Now
Questions 9

Which detection method would detect a mismatch between the file name and its content type? (Choose the best answer.)

Options:

A.

Checking the MIME type

B.

Checking the file extension

C.

Checking the protocol type

D.

Inspecting the file signature

Buy Now
Questions 10

Which log facility is used to log HTTP traffic by default? (Choose the best answer.)

Options:

A.

bcreportermain_v1

B.

main

C.

http

D.

elff

Buy Now
Questions 11

How does a server know where to retrieve the requested information when it receives a GET request method? (Choose the best answer.)

Options:

A.

The server examines the certificate of the requesting IP address

B.

The URL is in the GET request

C.

The server retrieves it from the server cache

D.

The server must return a response message requesting the URL

Buy Now
Questions 12

Which kind of authentication credentials might Schannel congestion in IWA direct realms be an issue with? (Choose the best answer.)

Options:

A.

NTLM

B.

Surrogate credentials

C.

Kerberos

D.

Basic

Buy Now
Questions 13

How do policy checkpoints evaluate the installed policy on a ProxySG? (Choose the best answer.)

Options:

A.

At each checkpoint, a decision is made whether to allow or deny the transaction

B.

The Server In checkpoint decides which rules will be evaluated by the other checkpoints

C.

Relevant rules are evaluated at each checkpoint based on the information about the transaction that is available at that point

D.

The Client In checkpoint decides which rules will be evaluated by the other checkpoints

Buy Now
Questions 14

Which proxy service intercepts HTTPS traffic when browsers point directly to the ProxySG and Detect Protocol is enabled? (Choose the best answer.)

Options:

A.

SSL

B.

Explicit HTTP

C.

HTTPS

D.

TCP Tunnel

Buy Now
Questions 15

When will a policy trace report a rule processing result of “N/A”? (Choose the best answer.)

Options:

A.

When the layer containing the rule is disabled

B.

When the rule is not reached during evaluation

C.

When the rule makes no sense for the specific transaction being processed

D.

When the rule is contradicted by a subsequent rule

Buy Now
Questions 16

Which deployment method represents a single point of failure? (Choose the best answer.)

Options:

A.

Explicit

B.

Basic

C.

Transparent

D.

Inline

Buy Now
Questions 17

Which two (2) methods are able to be used to regain access to the setup console if an administrator loses the password? (Choose two.)

Options:

A.

Access the ProxySG from another ProxySG

B.

Open a serial connection, and use the CLI command restore-defaults factory-defaults

C.

Use Management Center to access the setup console

D.

Use the front panel buttons and screen, if available on this model, to reset the password

E.

Press Control + ALT + DEL

Buy Now
Questions 18

Which service is provided by the ProxySG? (Choose the best answer.)

Options:

A.

Virus scanning

B.

Strong authentication

C.

Edge routing

D.

Sandboxing

Buy Now
Questions 19

What is typically the biggest load on a CPU when managing encrypted traffic? (Choose the best answer.)

Options:

A.

Emulating certificates

B.

Using the SHA-2 hash function

C.

Using RSA encryption

D.

The need for redirection

Buy Now
Questions 20

What allows WebPulse to provide real-time revisions to the WebFilter database? (Choose the best answer.)

Options:

A.

Dynamic categorization

B.

Creating a local database

C.

Threat risk levels

D.

Configuring application controls

Buy Now
Questions 21

Which section of the sysinfo file would persistent data manager (PDM) information be found within? (Choose the best answer.)

Options:

A.

Configuration

B.

Statistics

C.

Logs

D.

System states

Buy Now
Exam Code: 250-556
Exam Name: Administration of Symantec ProxySG 6.7
Last Update: May 16, 2024
Questions: 70
$64  $159.99
$48  $119.99
$40  $99.99
buy now 250-556