Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Symantec 250-556 Administration of Symantec ProxySG 6.7 Exam Practice Test

Demo: 10 questions
Total 70 questions

Administration of Symantec ProxySG 6.7 Questions and Answers

Question 1

What are two (2) methods by which the ProxySG can detect the type of a file that is downloaded? (Choose two.)

Options:

A.

Checking the HTTP cache

B.

Performing an anti-virus scan

C.

Checking the file extension

D.

Submitting the URL to WebPulse

E.

Detecting apparent data type

Question 2

Which two (2) methods are able to be used to regain access to the setup console if an administrator loses the password? (Choose two.)

Options:

A.

Access the ProxySG from another ProxySG

B.

Open a serial connection, and use the CLI command restore-defaults factory-defaults

C.

Use Management Center to access the setup console

D.

Use the front panel buttons and screen, if available on this model, to reset the password

E.

Press Control + ALT + DEL

Question 3

Which kind of authentication credentials might Schannel congestion in IWA direct realms be an issue with? (Choose the best answer.)

Options:

A.

NTLM

B.

Surrogate credentials

C.

Kerberos

D.

Basic

Question 4

What is a series of sysinfo files gathered at periodic intervals called? (Choose the best answer.)

Options:

A.

Core image dump

B.

Event logs

C.

Snapshot

D.

Minicontext

Question 5

Where does the ProxySG get the text of the exception page, when it sends an exception page to a client? (Choose the best answer.)

Options:

A.

From the VPM-XML file

B.

From WebPulse

C.

From the exception definition stored on the ProxySG

D.

From Symantec Technical Support

Question 6

Which two (2) situations might require a reverse DNS lookup? (Choose two.)

Options:

A.

If the access log is enabled and a field in the access log requires a hostname

B.

If both the primary and alternate forward DNS servers go down

C.

If primary authentication fails

D.

If a policy trigger event requires it

E.

If a forward DNS lookup fails

Question 7

What should an administrator utilize in policies to specify which traffic should be decrypted? (Choose the best answer.)

Options:

A.

Listeners

B.

URL categories

C.

The SSL Proxy

D.

All proxy services

Question 8

When does the ProxySG establish an Schannel? (Choose the best answer.)

Options:

A.

When the client sends an NTLM type 2 message to the ProxySG

B.

When a client request is first received

C.

When IWA authentication fails

D.

When the client sends an NTLM type 3 message to the ProxySG

Question 9

In which type of physical deployment does a ProxySG have potential visibility to all traffic through the use of a device such as WCCP-capable router or a Layer 4 switch? (Choose the best answer.)

Options:

A.

Transparent

B.

Explicit

C.

Layer 4

D.

In-path

Question 10

When can more than one authentication realm be active at any given time on the ProxySG? (Choose the best answer.)

Options:

A.

Only in explicit mode

B.

Never

C.

Only in transparent mode

D.

When policy is being evaluated

Demo: 10 questions
Total 70 questions