Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Symantec 250-556 - Administration of Symantec ProxySG 6.7

Page: 2 / 3
Total 70 questions

Where does the ProxySG get the text of the exception page, when it sends an exception page to a client? (Choose the best answer.)

A.

From the VPM-XML file

B.

From WebPulse

C.

From the exception definition stored on the ProxySG

D.

From Symantec Technical Support

Which two (2) environments will IP surrogate credentials NOT work in? (Choose two.)

A.

With devices that use Network Address Translation

B.

Out-of-path deployments

C.

Transparent deployments

D.

Explicit deployments

E.

Multi-user environments such as Citrix

How does a server know where to retrieve the requested information when it receives a GET request method? (Choose the best answer.)

A.

The server examines the certificate of the requesting IP address

B.

The URL is in the GET request

C.

The server retrieves it from the server cache

D.

The server must return a response message requesting the URL

Which log facility is used to log HTTP traffic by default? (Choose the best answer.)

A.

bcreportermain_v1

B.

main

C.

http

D.

elff

Which two (2) methods are able to be used to regain access to the setup console if an administrator loses the password? (Choose two.)

A.

Access the ProxySG from another ProxySG

B.

Open a serial connection, and use the CLI command restore-defaults factory-defaults

C.

Use Management Center to access the setup console

D.

Use the front panel buttons and screen, if available on this model, to reset the password

E.

Press Control + ALT + DEL

Which detection method would detect a mismatch between the file name and its content type? (Choose the best answer.)

A.

Checking the MIME type

B.

Checking the file extension

C.

Checking the protocol type

D.

Inspecting the file signature

When does the ProxySG establish an Schannel? (Choose the best answer.)

A.

When the client sends an NTLM type 2 message to the ProxySG

B.

When a client request is first received

C.

When IWA authentication fails

D.

When the client sends an NTLM type 3 message to the ProxySG

In which type of physical deployment does a ProxySG have potential visibility to all traffic through the use of a device such as WCCP-capable router or a Layer 4 switch? (Choose the best answer.)

A.

Transparent

B.

Explicit

C.

Layer 4

D.

In-path

Which two (2) errors are the most common certificate errors? (Choose two.)

A.

The server does NOT recognize the ProxySG.

B.

The client does NOT trust the server.

C.

The client does NOT trust the ProxySG.

D.

The ProxySG does NOT trust the server.

E.

The server does NOT trust the client.

Which service is provided by the ProxySG? (Choose the best answer.)

A.

Virus scanning

B.

Strong authentication

C.

Edge routing

D.

Sandboxing