Pass4itsure > Symantec > Symantec Certified Specialist > 250-430 > 250-430 Online Practice Questions and Answers

250-430 Online Practice Questions and Answers

Questions 4

Which is the default TCP port for HTTP?

A. 20

B. 80

C. 443

D. 43

Buy Now
Questions 5

By default, HTTP traffic that is logged is recorded to which log facility?

A. bcreportermain_v1

B. main

C. elf

D. http

Buy Now
Questions 6

Name three methods by which client configuration can be performed in an explicit ProxySG deployment. (Choose three.)

A. Configure the user agent to point to the IP address or hostname of the ProxySG

B. Configure the user agent to point to the location of a PAC file

C. Configure the user agent to use WPAD

D. Use Symantec Management Center to configure the user agent

E. Configure forwarding hosts on the ProxySG

Buy Now
Questions 7

If you have configured continuous uploading of access logs and the ProxySG is unable to reach the upload destination, what happens to the log entries?

A. They are uploaded in real time to the backup upload destination configured in the Management Console

B. None of these answers

C. They are stored locally until the connection is re-established, and then they are uploaded

D. They are discarded

Buy Now
Questions 8

SGOS is based on which other operating system?

A. Unix

B. VxWorks

C. pSOS

D. None of these answers E. Windows

Buy Now
Questions 9

When will a policy trace report a rule processing result of "N/A"?

A. When the rule is not reached during evaluation

B. When the rule makes no sense for the specific transaction being processed

C. When the layer containing the rule is disabled

Buy Now
Questions 10

Which of the following tests one aspect of a request against a Boolean expression of values?

A. Rules

B. Conditions

C. Layers

D. Triggers

Buy Now
Questions 11

What is one drawback to using apparent data type to detect the file type?

A. Presents a security risk

B. Less accurate than HTTP content type detection

C. None of these answers

D. Most resource-intensive

Buy Now
Questions 12

What would happen if the ProxySG did not use surrogate credentials to authenticate users who use transparent proxy connections?

A. They would not be able to authenticate to the ProxySG

B. The ProxySG does not need to use surrogate credentials to authenticate users who use transparent proxy connections

C. They would have to reauthenticate for each domain that they access

Buy Now
Questions 13

Where does ProxySG object caching usually result in the most bandwidth savings?

A. On the server side

B. On the client side

Buy Now
Exam Code: 250-430
Exam Name: Administration of Blue Coat ProxySG 6.6
Last Update: Nov 24, 2024
Questions: 70
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99