Pass the Symantec Symantec Certified Specialist 250-556 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which process should never be configured on external DNS servers? (Choose the best answer.)

Options:

A.

Bypass the ProxySG’s cache


B.

Use DNS imputing


C.

Perform lookups on internal servers


D.

Perform reverse DNS lookups


Questions # 2:

What is the default TCP port for HTTP? (Choose the best answer.)

Options:

A.

20


B.

443


C.

80


D.

43


Questions # 3:

Where can an administrator create a new built-in exception on the ProxySG? (Choose the best answer.)

Options:

A.

An administrator is unable to do this


B.

In the Management Console


C.

In the CLI


D.

In the Visual Policy Manager


Questions # 4:

Which VPM layer can be most commonly used to control decrypting of SSL traffic by authenticated username? (Choose the best answer.)

Options:

A.

SSL Authentication layer


B.

Web Authentication layer


C.

SSL Intercept layer


D.

None of these answers


Questions # 5:

When can more than one authentication realm be active at any given time on the ProxySG? (Choose the best answer.)

Options:

A.

Only in explicit mode


B.

Never


C.

Only in transparent mode


D.

When policy is being evaluated


Questions # 6:

What does the SSL Proxy do by default? (Choose the best answer.)

Options:

A.

Scans traffic for malware


B.

Blocks encrypted traffic


C.

Tunnels all HTTPS traffic


D.

Intercepts all HTTPS traffic


Questions # 7:

What is a component of a proxy service listener? (Choose the best answer.)

Options:

A.

Encryption hash


B.

Source IP address


C.

Proxy mode


D.

Proxy type


Questions # 8:

Which detection method would detect a mismatch between the file name and its content type? (Choose the best answer.)

Options:

A.

Checking the MIME type


B.

Checking the file extension


C.

Checking the protocol type


D.

Inspecting the file signature


Questions # 9:

What happens when the ProxySG discovers a match for a rule in policy? (Choose the best answer.)

Options:

A.

The ProxySG stops further processing in the layer containing the rule.


B.

The ProxySG continues processing to see whether a further rule might negate the first rule.


C.

It depends on the default policy configured.


D.

The ProxySG stops further processing and executes the rule.


Questions # 10:

Which two (2) services are provided by the ProxySG? (Choose two.)

Options:

A.

Virus scanning


B.

Sandboxing


C.

Encrypted traffic management


D.

Policy enforcement


E.

Forensic analysis


Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions