Vcehome > Symantec > Symantec Certified Specialist > 250-556 > 250-556 Online Practice Questions and Answers

250-556 Online Practice Questions and Answers

Questions 4

Which best describes BCAAA? (Choose the best answer.)

A. An intermediary between the ProxySG and an authentication server

B. An application that sends sysinfo snapshots to Symantec support

C. Symantec's internal authorization and authentication service

D. A utility that allows a direct connection between the ProxySG and an authentication domain.

Browse 70 Q&As
Questions 5

Which type of object is a Notify User object in the VPM? (Choose the best answer.)

A. Destination

B. Action

C. Track

D. Source

Browse 70 Q&As
Questions 6

Which service setting determines whether the traffic is passed to the SSL proxy or the HTTP proxy when a browser is configured to use an explicit proxy connection to the ProxySG? (Choose the best answer.)

A. Enable SSL/TLS

B. Detect protocol

C. Authenticate-401

D. Forward client cert

Browse 70 Q&As
Questions 7

Which section of a policy trace would an administrator locate the original HTTP GET request in? (Choose the best answer.)

A. Connection info

B. HTTP section

C. Policy decision

D. Header

Browse 70 Q&As
Questions 8

Where does the ProxySG get the text of the exception page, when it sends an exception page to a client? (Choose the best answer.)

A. From the VPM-XML file

B. From WebPulse

C. From the exception definition stored on the ProxySG

D. From Symantec Technical Support

Browse 70 Q&As
Questions 9

What happens when the ProxySG discovers a match for a rule in policy? (Choose the best answer.)

A. The ProxySG stops further processing in the layer containing the rule.

B. The ProxySG continues processing to see whether a further rule might negate the first rule.

C. It depends on the default policy configured.

D. The ProxySG stops further processing and executes the rule.

Browse 70 Q&As
Questions 10

Which process should never be configured on external DNS servers? (Choose the best answer.)

A. Bypass the ProxySG's cache

B. Use DNS imputing

C. Perform lookups on internal servers

D. Perform reverse DNS lookups

Browse 70 Q&As
Questions 11

Which VPM layer can be most commonly used to control decrypting of SSL traffic by authenticated username? (Choose the best answer.)

A. SSL Authentication layer

B. Web Authentication layer

C. SSL Intercept layer

D. None of these answers

Browse 70 Q&As
Questions 12

When does the ProxySG establish an Schannel? (Choose the best answer.)

A. When the client sends an NTLM type 2 message to the ProxySG

B. When a client request is first received

C. When IWA authentication fails

D. When the client sends an NTLM type 3 message to the ProxySG

Browse 70 Q&As
Questions 13

Which detection method would detect a mismatch between the file name and its content type? (Choose the best answer.)

A. Checking the MIME type

B. Checking the file extension

C. Checking the protocol type

D. Inspecting the file signature

Browse 70 Q&As
Exam Code: 250-556
Exam Name: Administration of Symantec ProxySG 6.7
Last Update:
Questions: 70 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99