Pre-Winter Special Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Symantec 250-556 Administration of Symantec ProxySG 6.7 Exam Practice Test

Page: 1 / 7
Total 70 questions

Administration of Symantec ProxySG 6.7 Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

What are two (2) access methods to the ProxySG? (Choose two.)

Options:

A.

From a smartphone running the Symantec app

B.

Via the enterprise wireless network

C.

From the front panel of the appliance

D.

A direct connection via a serial cable to the serial console

E.

From the back panel of the appliance

Question 2

How does the ProxySG handle a rule that contains a syntax error when the ProxySG processes installed policy as part of a client transaction? (Choose the best answer.)

Options:

A.

The ProxySG changes the transaction status to Deny and makes an entry in the event log

B.

The ProxySG stops processing of the layer containing the rule and continues with the next layer, if any

C.

This is NOT possible; rules with syntax errors are unable to be installed.

D.

The ProxySG skips the rule and does NOT change the accept or deny status of the transaction

Question 3

Which two (2) methods are able to be used to regain access to the setup console if an administrator loses the password? (Choose two.)

Options:

A.

Access the ProxySG from another ProxySG

B.

Open a serial connection, and use the CLI command restore-defaults factory-defaults

C.

Use Management Center to access the setup console

D.

Use the front panel buttons and screen, if available on this model, to reset the password

E.

Press Control + ALT + DEL

Question 4

Which SGOS edition is designed for Secure Web Gateway hardware deployments? (Choose the best answer.)

Options:

A.

Proxy Edition

B.

Premium Edition

C.

MACH5 Edition

D.

Basic Edition

Question 5

Which process should never be configured on external DNS servers? (Choose the best answer.)

Options:

A.

Bypass the ProxySG’s cache

B.

Use DNS imputing

C.

Perform lookups on internal servers

D.

Perform reverse DNS lookups

Question 6

What happens when the ProxySG discovers a match for a rule in policy? (Choose the best answer.)

Options:

A.

The ProxySG stops further processing in the layer containing the rule.

B.

The ProxySG continues processing to see whether a further rule might negate the first rule.

C.

It depends on the default policy configured.

D.

The ProxySG stops further processing and executes the rule.

Question 7

What is a drawback to utilizing apparent data types to detect the file type? (Choose the best answer.)

Options:

A.

Does not block “drive-by” malware installation

B.

Less accurate than HTTP content type detection

C.

Presents a security risk

D.

Most resource-intensive

Question 8

What is a series of sysinfo files gathered at periodic intervals called? (Choose the best answer.)

Options:

A.

Core image dump

B.

Event logs

C.

Snapshot

D.

Minicontext

Question 9

What does it mean if WebPulse returns a URL category of “Pending”? (Choose the best answer.)

Options:

A.

The URL has NOT been categorized by WebFilter

B.

Background categorization is being performed in WebPulse

C.

An exception is being sent to the client

D.

The ProxySG waits before applying policy to the request

Question 10

What is typically the biggest load on a CPU when managing encrypted traffic? (Choose the best answer.)

Options:

A.

Emulating certificates

B.

Using the SHA-2 hash function

C.

Using RSA encryption

D.

The need for redirection

Page: 1 / 7
Total 70 questions