Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium Symantec 250-556 Dumps Questions Answers

Page: 1 / 3
Total 70 questions

Administration of Symantec ProxySG 6.7 Questions and Answers

Question 1

Which two (2) services are provided by the ProxySG? (Choose two.)

Options:

A.

Virus scanning

B.

Sandboxing

C.

Encrypted traffic management

D.

Policy enforcement

E.

Forensic analysis

Buy Now
Question 2

What is a component of a proxy service listener? (Choose the best answer.)

Options:

A.

Encryption hash

B.

Source IP address

C.

Proxy mode

D.

Proxy type

Question 3

In which caching technique are objects that require more server-side bandwidth and response time less likely to be deleted from the cache? (Choose the best answer.)

Options:

A.

Round robin

B.

Cost-based deletion

C.

Popularity contest

D.

Asynchronous adaptive refresh

Question 4

Which two (2) methods are able to be used to regain access to the setup console if an administrator loses the password? (Choose two.)

Options:

A.

Access the ProxySG from another ProxySG

B.

Open a serial connection, and use the CLI command restore-defaults factory-defaults

C.

Use Management Center to access the setup console

D.

Use the front panel buttons and screen, if available on this model, to reset the password

E.

Press Control + ALT + DEL

Question 5

Which two (2) locations is the WebFilter database stored in? (Choose two.)

Options:

A.

At several data centers around the world

B.

In the WebPulse data cache

C.

On clients’ mobile devices

D.

On a properly licensed ProxySG

E.

Symantec Management Center

Question 6

How does a network administrator access sysinfo files? (Choose the best answer.)

Options:

A.

Through the CLI

B.

Through the Management Console

C.

By creating a sysinfo layer in the VPM

D.

Through the use of an advanced URL in a browser

Question 7

Which section of the sysinfo file would an administrator examine to see how specific components are behaving? (Choose the best answer.)

Options:

A.

Configuration

B.

Logs

C.

System state

D.

Statistics

Question 8

What must the virtual URL point to, when the ProxySG utilizes a virtual URL for user authentication in a transparent deployment? (Choose the best answer.)

Options:

A.

The IP address of the origin content server

B.

The IP address of the ProxySG

C.

A hostname that the user agent can DNS-resolve to an IP address

D.

The hostname of the origin content server

Question 9

When will a policy trace report a rule processing result of “N/A”? (Choose the best answer.)

Options:

A.

When the layer containing the rule is disabled

B.

When the rule is not reached during evaluation

C.

When the rule makes no sense for the specific transaction being processed

D.

When the rule is contradicted by a subsequent rule

Question 10

How does an administrator create a single group in policy that includes multiple client addresses? (Choose the best answer.)

Options:

A.

Create a combined policy object.

B.

Include the addresses in a layer guard.

C.

This can only be done using CPL.

D.

Use a dedicated layer.

Page: 1 / 3
Total 70 questions