Download Symantec.250-556.VCEplus.2020-08-29.70q.vcex

Download Exam

File Info

Exam Administration of Symantec ProxySG 6-7
Number 250-556
File Name Symantec.250-556.VCEplus.2020-08-29.70q.vcex
Size 32 KB
Posted Aug 29, 2020
Download Symantec.250-556.VCEplus.2020-08-29.70q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

When will a policy trace report a rule processing result of "N/A"? (Choose the best answer.)


  1. When the layer containing the rule is disabled
  2. When the rule is not reached during evaluation
  3. When the rule makes no sense for the specific transaction being processed
  4. When the rule is contradicted by a subsequent rule
Correct answer: C



Question 2

What is a component of a proxy service listener? (Choose the best answer.)


  1. Encryption hash
  2. Source IP address
  3. Proxy mode
  4. Proxy type
Correct answer: B



Question 3

Which service is provided by the ProxySG? (Choose the best answer.)


  1. Virus scanning
  2. Strong authentication
  3. Edge routing
  4. Sandboxing
Correct answer: B



Question 4

Which best describes BCAAA? (Choose the best answer.)


  1. An intermediary between the ProxySG and an authentication server
  2. An application that sends sysinfo snapshots to Symantec support
  3. Symantec's internal authorization and authentication service
  4. A utility that allows a direct connection between the ProxySG and an authentication domain.
Correct answer: A



Question 5

Which two (2) categories of traffic are typically left encrypted? (Choose two.)


  1. Gambling
  2. News Media
  3. Social Media
  4. Financial Services
  5. Health
Correct answer: DE



Question 6

When must BCAAA be used? (Choose the best answer.)


  1. When an administrator needs to establish more than one Schannel to increase performance.
  2. When more than one ProxySG are deployed
  3. When the ProxySG is unable to directly utilize APIs that require traditional operating systems.
  4. When Basic credentials are used
Correct answer: C



Question 7

Which type of object is a Notify User object in the VPM? (Choose the best answer.)


  1. Destination
  2. Action
  3. Track
  4. Source
Correct answer: B



Question 8

Which two (2) situations might require a reverse DNS lookup? (Choose two.)


  1. If the access log is enabled and a field in the access log requires a hostname
  2. If both the primary and alternate forward DNS servers go down
  3. If primary authentication fails
  4. If a policy trigger event requires it 
  5. If a forward DNS lookup fails
Correct answer: AD



Question 9

What is the default TCP port for HTTP? (Choose the best answer.)


  1. 20
  2. 443
  3. 80
  4. 43
Correct answer: C



Question 10

What is typically the biggest load on a CPU when managing encrypted traffic? (Choose the best answer.)


  1. Emulating certificates
  2. Using the SHA-2 hash function
  3. Using RSA encryption
  4. The need for redirection
Correct answer: A









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files