Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Administration of Symantec ProxySG 6.7 Question and Answers

Administration of Symantec ProxySG 6.7

Last Update Apr 29, 2024
Total Questions : 70

We are offering FREE 250-556 Symantec exam questions. All you do is to just go and sign up. Give your details, prepare 250-556 free exam questions and then go for complete pool of Administration of Symantec ProxySG 6.7 test questions that will help you more.

250-556 pdf

250-556 PDF

$35  $99.99
250-556 Engine

250-556 Testing Engine

$42  $119.99
250-556 PDF + Engine

250-556 PDF + Testing Engine

$56  $159.99
Questions 1

Which deployment method represents a single point of failure? (Choose the best answer.)

Options:

A.  

Explicit

B.  

Basic

C.  

Transparent

D.  

Inline

Discussion 0
Questions 2

When must BCAAA be used? (Choose the best answer.)

Options:

A.  

When an administrator needs to establish more than one Schannel to increase performance.

B.  

When more than one ProxySG are deployed

C.  

When the ProxySG is unable to directly utilize APIs that require traditional operating systems.

D.  

When Basic credentials are used

Discussion 0
Questions 3

Which VPM layer can be most commonly used to control decrypting of SSL traffic by authenticated username? (Choose the best answer.)

Options:

A.  

SSL Authentication layer

B.  

Web Authentication layer

C.  

SSL Intercept layer

D.  

None of these answers

Discussion 0
Questions 4

When does the ProxySG establish an Schannel? (Choose the best answer.)

Options:

A.  

When the client sends an NTLM type 2 message to the ProxySG

B.  

When a client request is first received

C.  

When IWA authentication fails

D.  

When the client sends an NTLM type 3 message to the ProxySG

Discussion 0
Questions 5

Which detection method would detect a mismatch between the file name and its content type? (Choose the best answer.)

Options:

A.  

Checking the MIME type

B.  

Checking the file extension

C.  

Checking the protocol type

D.  

Inspecting the file signature

Discussion 0
Questions 6

Which two (2) methods are able to be used to regain access to the setup console if an administrator loses the password? (Choose two.)

Options:

A.  

Access the ProxySG from another ProxySG

B.  

Open a serial connection, and use the CLI command restore-defaults factory-defaults

C.  

Use Management Center to access the setup console

D.  

Use the front panel buttons and screen, if available on this model, to reset the password

E.  

Press Control + ALT + DEL

Discussion 0
Questions 7

Which two (2) locations is the WebFilter database stored in? (Choose two.)

Options:

A.  

At several data centers around the world

B.  

In the WebPulse data cache

C.  

On clients’ mobile devices

D.  

On a properly licensed ProxySG

E.  

Symantec Management Center

Discussion 0
Questions 8

Which proxy service intercepts HTTPS traffic when browsers point directly to the ProxySG and Detect Protocol is enabled? (Choose the best answer.)

Options:

A.  

SSL

B.  

Explicit HTTP

C.  

HTTPS

D.  

TCP Tunnel

Discussion 0
Questions 9

In which type of physical deployment does a ProxySG have potential visibility to all traffic through the use of a device such as WCCP-capable router or a Layer 4 switch? (Choose the best answer.)

Options:

A.  

Transparent

B.  

Explicit

C.  

Layer 4

D.  

In-path

Discussion 0
Questions 10

In which caching technique does the ProxySG open multiple server connections to retrieve objects referenced on a web page before the client actually issues the requests for those objects? (Choose the best answer.)

Options:

A.  

Popularity contest

B.  

Cost-based deletion

C.  

Asynchronous adaptive refresh

D.  

Pipelining

Discussion 0