Certbus > Symantec > Symantec Certified Specialist > 250-430 > 250-430 Online Practice Questions and Answers

250-430 Online Practice Questions and Answers

Questions 4

In which type of physical deployment does a ProxySG have potential visibility to all traffic through the use of a device such as a WCCP-capable router or a Layer 4 switch?

A. Transparent

B. None of these answers

C. Explicit

D. Virtually Inline

Browse 70 Q&As
Questions 5

Which is the default TCP port for HTTP?

A. 20

B. 80

C. 443

D. 43

Browse 70 Q&As
Questions 6

Which Symantec product is best suited for simultaneously administering a large number of ProxySG appliances?

A. Reporter

B. PacketShaper

C. Content Analysis

D. Management Center

Browse 70 Q&As
Questions 7

Why is Kerberos performance better than NTLM?

A. It uses less encryption

B. None of these answers

C. Only two round trips are required between the browser and an authentication server

D. It works with later versions of Microsoft Windows

Browse 70 Q&As
Questions 8

What does the authentication mode specify?

A. The time-to-live for credentials

B. The protocol used to communicate with the authentication service

C. The challenge type and the accepted surrogate

D. Whether the credentials will be encrypted

Browse 70 Q&As
Questions 9

Which of the following is not a VPM trigger object?

A. Time

B. Source

C. Destination

D. Service

E. Action

Browse 70 Q&As
Questions 10

If you have configured continuous uploading of access logs and the ProxySG is unable to reach the upload destination, what happens to the log entries?

A. They are uploaded in real time to the backup upload destination configured in the Management Console

B. None of these answers

C. They are stored locally until the connection is re-established, and then they are uploaded

D. They are discarded

Browse 70 Q&As
Questions 11

A local database can be used as an alternative of what?

A. The ProxySG does not support local databases

B. Either an on-box or off-box database

C. An off-box WebFilter database only

D. An on-box database only

Browse 70 Q&As
Questions 12

Which of the following are common elements of a GET request? (Choose three.)

A. The protocol version

B. The MAC address of the client user agent

C. A resource

D. A method

Browse 70 Q&As
Questions 13

Which of the following is NOT a component of a proxy service listener?

A. Source IP address

B. Port range

C. Destination IP address

D. Proxy type

Browse 70 Q&As
Questions 14

In which client connection type are user agents aware that a proxy has been deployed?

A. Explicit proxy

B. In every connection type

C. Inline

D. Transparent

Browse 70 Q&As
Questions 15

Of the methods that the ProxySG uses to detect file type, which one is usually the most accurate?

A. Checking the HTTP content type (or MIME type)

B. Performing an anti-virus scan

C. Detecting apparent data type D. Checking the file extension

Browse 70 Q&As
Questions 16

Which one of these statements best describes how policy checkpoints evaluate the installed policy on a ProxySG?

A. The Server In checkpoint decides which rules will be evaluated by the other checkpoints

B. The Client In checkpoint decides which rules will be evaluated by the other checkpoints

C. At each checkpoint, a decision is made whether to allow or deny the transaction

D. Relevant rules are evaluated at each checkpoint based on the information about the transaction that is available at that point

Browse 70 Q&As
Questions 17

What is typically the biggest load on CPU?

A. MD5

B. Emulating certificates

C. Using RSA

D. SHA-2

Browse 70 Q&As
Questions 18

What can you use to specify which traffic should be encrypted?

A. The SSL Proxy

B. Listeners

C. All proxy services

D. Categories

Browse 70 Q&As
Exam Code: 250-430
Exam Name: Administration of Blue Coat ProxySG 6.6
Last Update: Apr 15, 2024
Questions: 70 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99