Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Symantec 250-440 - Administration of Symantec PacketShaper 11.9.1

Page: 1 / 3
Total 70 questions

When would the traffic class Inbound/HTTP inherit its policy from another class?

A.

When Inbound/HTTP has an ignore policy applied

B.

When Inbound/HTTP has a rate policy applied

C.

When Inbound/HTTP has a priority policy applied

D.

When Inbound/HTTP does not have a policy applied

Whatare the main two functional modules within the PacketShaper?

A.

Shaping module and Monitoring module

B.

Shaping module and Policy module

C.

Compression module and Acceleration module

D.

Monitoring module and Caching module

Which option is accurate as it relates to the sysLocation parameter?

A.

It is a short string describing the physical location of the host where the server is running.

B.

It is the part of an SNMP public password referring to the physical location where the server is running.

C.

It is a string encoding routing and NAT information to enable SNMP packets to reach the host from other subnets.

D.

It is a path on an SNMP host to distinguish between many agents that may be running on that host.

Which option does Symantec recommend to

A.

Precise management of TCP traffic, but not IP traffic

B.

Prease management of UDP traffic only

C.

Rate priorities for TCP traffic

D.

Management of TCP and UDP traffic, but not non-IP traffic

What partitions could an administrator apply to a class in the Sky UI?

A.

You can apply any supported partitions and policies from the Sky UI

B.

You can apply any supported partition from the Sky UI, but you must apply policies from the Advanced UI

C.

You cannot apply them from the Sky Ul, you must use the Advanced UI to apply policies and partitions

D.

You can apply static or dynamic partitions, but not burstable ones from the Sky UI

Which scenario wouldthe "burstable al priority" attribute be used in?

A.

To enable a traffic class to access unused bandwidth at Priority 3 or above

B.

When a limit is specified that is less than the policy's guaranteed rate

C.

When a limit is specified that is greater than the policy's guaranteed rate

D.

To enable a traffic class to access unused bandwidth at a specified priority level

Refer to the exhibit.

Which PacketShaper feature is shown here?

A.

The Manage tab, displaying the ten classes that were tested against various protocols in the past week

B.

The Top Ten tab, displaying the ten classes that generated the most traffic in the past hour

C.

The Monitor tab, displaying real-time traffic and bandwidth data

D.

The Top Ten tab, displaying the average packet exchange time in milliseconds for the top ten classes in the past day

What do instances of bold text in the PacfcetShapet Wffie lice represent?

A.

Default Policy

B.

Policy that n actively being used

C.

Policythat was changed during the current session

D.

Inheritable Policy

What doesthe Packets Size retransmitted graph display?

A.

Transmuted packets against retransmitted packets, in seven size buckets

B.

Transmitted bytes against retransmitted bytes, m line chart format

C.

Packets received on the Inbound or Outbound link, in line chart formal

D.

Packets received on the Inbound or Outbound link, in seven size buckets

Twoclasses need to be created; a Citrix class that matches traffic by client name, an HTTP class thatmatches traffic by user-agent had URL. Which command helps determine the matching rules?

A.

class criteria

B.

traffic history

C.

class capture-IDs

D.

traffic flow