Symantec 250-556 - Administration of Symantec ProxySG 6.7
Which diagnostic tool allows an administrator to examine how the ProxySG has applied policy to a particular request? (Choose the best answer.)
Which section of the sysinfo file would an administrator examine to see how specific components are behaving? (Choose the best answer.)
Which kind of authentication credentials might Schannel congestion in IWA direct realms be an issue with? (Choose the best answer.)
Which two (2) services are provided by the ProxySG? (Choose two.)
What best describes SGOS? (Choose the best answer.)
What are the building blocks of conditions when building policies in CPL? (Choose the best answer.)
What must the virtual URL point to, when the ProxySG utilizes a virtual URL for user authentication in a transparent deployment? (Choose the best answer.)
What is a series of sysinfo files gathered at periodic intervals called? (Choose the best answer.)
What are two (2) access methods to the ProxySG? (Choose two.)
How do policy checkpoints evaluate the installed policy on a ProxySG? (Choose the best answer.)