Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Symantec 250-556 - Administration of Symantec ProxySG 6.7

Page: 1 / 3
Total 70 questions

Which diagnostic tool allows an administrator to examine how the ProxySG has applied policy to a particular request? (Choose the best answer.)

A.

Policy/Statistics

B.

Policy monitor

C.

Policy tracing

D.

Packet capture

Which section of the sysinfo file would an administrator examine to see how specific components are behaving? (Choose the best answer.)

A.

Configuration

B.

Logs

C.

System state

D.

Statistics

Which kind of authentication credentials might Schannel congestion in IWA direct realms be an issue with? (Choose the best answer.)

A.

NTLM

B.

Surrogate credentials

C.

Kerberos

D.

Basic

Which two (2) services are provided by the ProxySG? (Choose two.)

A.

Virus scanning

B.

Sandboxing

C.

Encrypted traffic management

D.

Policy enforcement

E.

Forensic analysis

What best describes SGOS? (Choose the best answer.)

A.

It is Linux-based

B.

It is a custom-built operating system

C.

It is a Symantec proprietary implementation of Unix

D.

It is Windows-based

What are the building blocks of conditions when building policies in CPL? (Choose the best answer.)

A.

Triggers

B.

Properties

C.

Rules

D.

Layers

What must the virtual URL point to, when the ProxySG utilizes a virtual URL for user authentication in a transparent deployment? (Choose the best answer.)

A.

The IP address of the origin content server

B.

The IP address of the ProxySG

C.

A hostname that the user agent can DNS-resolve to an IP address

D.

The hostname of the origin content server

What is a series of sysinfo files gathered at periodic intervals called? (Choose the best answer.)

A.

Core image dump

B.

Event logs

C.

Snapshot

D.

Minicontext

What are two (2) access methods to the ProxySG? (Choose two.)

A.

From a smartphone running the Symantec app

B.

Via the enterprise wireless network

C.

From the front panel of the appliance

D.

A direct connection via a serial cable to the serial console

E.

From the back panel of the appliance

How do policy checkpoints evaluate the installed policy on a ProxySG? (Choose the best answer.)

A.

At each checkpoint, a decision is made whether to allow or deny the transaction

B.

The Server In checkpoint decides which rules will be evaluated by the other checkpoints

C.

Relevant rules are evaluated at each checkpoint based on the information about the transaction that is available at that point

D.

The Client In checkpoint decides which rules will be evaluated by the other checkpoints