Certbus > Symantec > Symantec SCS Certification > 250-556 > 250-556 Online Practice Questions and Answers

250-556 Online Practice Questions and Answers

Questions 4

Which two (2) categories of traffic are typically left encrypted? (Choose two.)

A. Gambling

B. News Media

C. Social Media

D. Financial Services

E. Health

Browse 70 Q&As
Questions 5

In which caching technique does the ProxySG open multiple server connections to retrieve objects referenced on a web page before the client actually issues the requests for those objects? (Choose the best answer.)

A. Popularity contest

B. Cost-based deletion

C. Asynchronous adaptive refresh

D. Pipelining

Browse 70 Q&As
Questions 6

How can an administrator determine the serial number of the ProxySG in the Management Console? (Choose the best answer.)

A. This information is not visible from the Management Console

B. Go to Statistics > Advanced

C. Go to Configuration > Network

D. The serial number is contained in the top right Management Console banner

Browse 70 Q&As
Questions 7

Which kind of authentication credentials might Schannel congestion in IWA direct realms be an issue with? (Choose the best answer.)

A. NTLM

B. Surrogate credentials

C. Kerberos

D. Basic

Browse 70 Q&As
Questions 8

What does it mean if WebPulse returns a URL category of "Pending"? (Choose the best answer.)

A. The URL has NOT been categorized by WebFilter

B. Background categorization is being performed in WebPulse

C. An exception is being sent to the client

D. The ProxySG waits before applying policy to the request

Browse 70 Q&As
Questions 9

How does an administrator view policy coverage statistics? (Choose the best answer.)

A. View the Policy Coverage statistics section of the sysinfo.

B. Use an advanced URL.

C. Create a dedicated layer in the VPM.

D. Use a global policy trace.

Browse 70 Q&As
Questions 10

Where does the ProxySG get the text of the exception page, when it sends an exception page to a client? (Choose the best answer.)

A. From the VPM-XML file

B. From WebPulse

C. From the exception definition stored on the ProxySG

D. From Symantec Technical Support

Browse 70 Q&As
Questions 11

How does a server know where to retrieve the requested information when it receives a GET request method? (Choose the best answer.)

A. The server examines the certificate of the requesting IP address

B. The URL is in the GET request

C. The server retrieves it from the server cache

D. The server must return a response message requesting the URL

Browse 70 Q&As
Questions 12

What is the primary benefit of using Integrated Windows Authentication (IWA) authentication realms? (Choose the best answer.)

A. Single sign-on experience for users

B. Better performance by using NTLM credentials

C. Ability to use Kerberos credentials

D. Greater security than LDAP

Browse 70 Q&As
Questions 13

Which two (2) methods are able to be used to regain access to the setup console if an administrator loses the password? (Choose two.)

A. Access the ProxySG from another ProxySG

B. Open a serial connection, and use the CLI command restore-defaults factory-defaults

C. Use Management Center to access the setup console

D. Use the front panel buttons and screen, if available on this model, to reset the password

E. Press Control + ALT + DEL

Browse 70 Q&As
Questions 14

Which diagnostic tool allows an administrator to examine how the ProxySG has applied policy to a particular request? (Choose the best answer.)

A. Policy/Statistics

B. Policy monitor

C. Policy tracing

D. Packet capture

Browse 70 Q&As
Questions 15

What are the building blocks of conditions when building policies in CPL? (Choose the best answer.)

A. Triggers

B. Properties

C. Rules

D. Layers

Browse 70 Q&As
Questions 16

Which section of the sysinfo file displays information such as the number of successes and failures? (Choose the best answer.)

A. System state statistics

B. Logs

C. Snapshots

D. Health check statistics

Browse 70 Q&As
Questions 17

Which section of the sysinfo file would an administrator examine to see how specific components are behaving? (Choose the best answer.)

A. Configuration

B. Logs

C. System state

D. Statistics

Browse 70 Q&As
Questions 18

When are software workers created during an interaction between a ProxySG and a client requesting a webpage? (Choose the best answer.)

A. At the ProxySG's initial configuration

B. When SGOS receives a connection request

C. When the ProxySG first boots up

D. When a transaction request must be fulfilled from the Internet rather than from the cache

Browse 70 Q&As
Exam Code: 250-556
Exam Name: Administration of Symantec ProxySG 6.7
Last Update: Apr 09, 2024
Questions: 70 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99