New Year Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Symantec > Symantec Certified Specialist > 250-556

250-556 Administration of Symantec ProxySG 6.7 Question and Answers

Question # 4

Which diagnostic tool allows an administrator to examine how the ProxySG has applied policy to a particular request? (Choose the best answer.)

A.

Policy/Statistics

B.

Policy monitor

C.

Policy tracing

D.

Packet capture

Full Access
Question # 5

When can more than one authentication realm be active at any given time on the ProxySG? (Choose the best answer.)

A.

Only in explicit mode

B.

Never

C.

Only in transparent mode

D.

When policy is being evaluated

Full Access
Question # 6

How do policy checkpoints evaluate the installed policy on a ProxySG? (Choose the best answer.)

A.

At each checkpoint, a decision is made whether to allow or deny the transaction

B.

The Server In checkpoint decides which rules will be evaluated by the other checkpoints

C.

Relevant rules are evaluated at each checkpoint based on the information about the transaction that is available at that point

D.

The Client In checkpoint decides which rules will be evaluated by the other checkpoints

Full Access
Question # 7

What is a series of sysinfo files gathered at periodic intervals called? (Choose the best answer.)

A.

Core image dump

B.

Event logs

C.

Snapshot

D.

Minicontext

Full Access
Question # 8

How does a server know where to retrieve the requested information when it receives a GET request method? (Choose the best answer.)

A.

The server examines the certificate of the requesting IP address

B.

The URL is in the GET request

C.

The server retrieves it from the server cache

D.

The server must return a response message requesting the URL

Full Access
Question # 9

When will a policy trace report a rule processing result of “N/A”? (Choose the best answer.)

A.

When the layer containing the rule is disabled

B.

When the rule is not reached during evaluation

C.

When the rule makes no sense for the specific transaction being processed

D.

When the rule is contradicted by a subsequent rule

Full Access
Question # 10

What is the default TCP port for HTTP? (Choose the best answer.)

A.

20

B.

443

C.

80

D.

43

Full Access