Pass the Symantec PacketShaper Administration 250-440 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

What does "network delay" mean within PacketShaper?

Options:

A.

The time lot the Oracle server to access memory


B.

The increase in average transaction


C.

The total transit time for a single packet to traverse the PacketShaper interfaces


D.

The total transit time for all requited packets


Expert Solution
Questions # 12:

A university warns to provide each student a minimum of 30 Kbps and a maximum ofISO Kbps to be used in any way. Which control mechanism does Symantec recommend to ensure this capacity?

Options:

A.

Rate Policy


B.

Burstable Partition


C.

Dynamic Subpartition


D.

Fixed Partition


Expert Solution
Questions # 13:

Which statement accurately describes rate policies and priority policies?

Options:

A.

Priority policies are most appropriate tor interactive trafficthat is burstable


B.

Rate polices apply only to non-IP traffic


C.

Traffic classes without a specific policy assigned, are allocated no bandwidth


D.

Traffic withrate policies are applied before the priority policy


Expert Solution
Questions # 14:

Which option does Symantec recommend to

Options:

A.

Precise management of TCP traffic, but not IP traffic


B.

Prease management of UDP traffic only


C.

Rate priorities for TCP traffic


D.

Management of TCP and UDP traffic, but not non-IP traffic


Expert Solution
Questions # 15:

What is required on the network to allow classification of traffic flow by a specific user?

Options:

A.

Install theBlue Coat Authentication and Authorization Agent (BCAAA) on a separate server.


B.

Nothing. Users are automatically discovered by your PacketShaper.


C.

Enable Users and Groups on the PacketShaper Setup page.


D.

Install the Blue Coat Authentication and Authorization Agent (BCAAA) on your PacketShaper appliance.


Expert Solution
Questions # 16:

Which two (2) actions are most appropriate for controlling prohibited, unsanctioned traffic flows such as music downloads? (Select two)

Options:

A.

Set a discard policy to block the traffic


B.

Set a never-admit policy to redirect the traffic


C.

Set a rate policy with 0 guaranteed, bur*table, at high priority


D.

Set a rate policy with 0 guaranteed, burnable, at priority 6


E.

Create a static partition for each branch


Expert Solution
Questions # 17:

Refer to the exhibit.

Question # 17

Which task must the administrator perform to make sure that traffic between (he IAN and DMZ is treated as pass-through PacketShaper installed as shown?

Options:

A.

Create a class for LAN-to-DMZ traffic and apply a 100 MB partition to it. ..


B.

Create a class for lANto-OMZ traffic and apply a 100-MB rate policy to it.


C.

Create a class for lAN-tO-DMZ traffic and apply an ignore policy to it.


D.

Configure the PacketShapet to automatically identify Inside and Outside hosts, therefor* no special configuration is required.


Expert Solution
Questions # 18:

Refer to the exhibit.

Question # 18

Which PacketShaper feature is shown here?

Options:

A.

The Manage tab, displaying the ten classes that were tested against various protocols in the past week


B.

The Top Ten tab, displaying the ten classes that generated the most traffic in the past hour


C.

The Monitor tab, displaying real-time traffic and bandwidth data


D.

The Top Ten tab, displaying the average packet exchange time in milliseconds for the top ten classes in the past day


Expert Solution
Questions # 19:

Which feature can be used to modify the amount of bandwidth available to an application based on the time of day?

Options:

A.

Adaptive Response


B.

BCAAA Server


C.

Command Scheduling


D.

Event Notification


Expert Solution
Questions # 20:

When would the traffic class Inbound/HTTP inherit its policy from another class?

Options:

A.

When Inbound/HTTP has an ignore policy applied


B.

When Inbound/HTTP has a rate policy applied


C.

When Inbound/HTTP has a priority policy applied


D.

When Inbound/HTTP does not have a policy applied


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions