Pass4itsure > Symantec > Symantec Certifications > 250-556 > 250-556 Online Practice Questions and Answers

250-556 Online Practice Questions and Answers

Questions 4

Which two (2) categories of traffic are typically left encrypted? (Choose two.)

A. Gambling

B. News Media

C. Social Media

D. Financial Services

E. Health

Buy Now
Questions 5

Which type of object is a Notify User object in the VPM? (Choose the best answer.)

A. Destination

B. Action

C. Track

D. Source

Buy Now
Questions 6

Which two (2) situations might require a reverse DNS lookup? (Choose two.)

A. If the access log is enabled and a field in the access log requires a hostname

B. If both the primary and alternate forward DNS servers go down

C. If primary authentication fails

D. If a policy trigger event requires it

E. If a forward DNS lookup fails

Buy Now
Questions 7

Which service setting determines whether the traffic is passed to the SSL proxy or the HTTP proxy when a browser is configured to use an explicit proxy connection to the ProxySG? (Choose the best answer.)

A. Enable SSL/TLS

B. Detect protocol

C. Authenticate-401

D. Forward client cert

Buy Now
Questions 8

Which Symantec product is best suited for simultaneously administering a large number of ProxySG appliances? (Choose the best answer.)

A. PacketShaper

B. Reporter

C. Management Center

D. Content Analysis

Buy Now
Questions 9

How does a network administrator access sysinfo files? (Choose the best answer.)

A. Through the CLI

B. Through the Management Console

C. By creating a sysinfo layer in the VPM

D. Through the use of an advanced URL in a browser

Buy Now
Questions 10

Which two (2) items are considered external dependencies? (Choose two.)

A. Policy

B. DNS

C. CPU

D. Authentication

E. Memory

Buy Now
Questions 11

What does the authentication mode specify? (Choose the best answer.)

A. The challenge type and the accepted surrogate

B. The protocol used to communicate with the authentication server

C. The time-to-live for credentials

D. Whether the credentials will be encrypted

Buy Now
Questions 12

Which two (2) environments will IP surrogate credentials NOT work in? (Choose two.)

A. With devices that use Network Address Translation

B. Out-of-path deployments

C. Transparent deployments

D. Explicit deployments

E. Multi-user environments such as Citrix

Buy Now
Questions 13

How do policy checkpoints evaluate the installed policy on a ProxySG? (Choose the best answer.)

A. At each checkpoint, a decision is made whether to allow or deny the transaction

B. The Server In checkpoint decides which rules will be evaluated by the other checkpoints

C. Relevant rules are evaluated at each checkpoint based on the information about the transaction that is available at that point

D. The Client In checkpoint decides which rules will be evaluated by the other checkpoints

Buy Now
Exam Code: 250-556
Exam Name: Administration of Symantec ProxySG 6.7
Last Update: Jan 17, 2025
Questions: 70
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99