Pass the Symantec Symantec Certified Specialist 250-556 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which two (2) methods are able to be used to regain access to the setup console if an administrator loses the password? (Choose two.)

Options:

A.

Access the ProxySG from another ProxySG


B.

Open a serial connection, and use the CLI command restore-defaults factory-defaults


C.

Use Management Center to access the setup console


D.

Use the front panel buttons and screen, if available on this model, to reset the password


E.

Press Control + ALT + DEL


Expert Solution
Questions # 12:

Which two (2) errors are the most common certificate errors? (Choose two.)

Options:

A.

The server does NOT recognize the ProxySG.


B.

The client does NOT trust the server.


C.

The client does NOT trust the ProxySG.


D.

The ProxySG does NOT trust the server.


E.

The server does NOT trust the client.


Expert Solution
Questions # 13:

In which type of physical deployment does a ProxySG have potential visibility to all traffic through the use of a device such as WCCP-capable router or a Layer 4 switch? (Choose the best answer.)

Options:

A.

Transparent


B.

Explicit


C.

Layer 4


D.

In-path


Expert Solution
Questions # 14:

What must the virtual URL point to, when the ProxySG utilizes a virtual URL for user authentication in a transparent deployment? (Choose the best answer.)

Options:

A.

The IP address of the origin content server


B.

The IP address of the ProxySG


C.

A hostname that the user agent can DNS-resolve to an IP address


D.

The hostname of the origin content server


Expert Solution
Questions # 15:

What does the authentication mode specify? (Choose the best answer.)

Options:

A.

The challenge type and the accepted surrogate


B.

The protocol used to communicate with the authentication server


C.

The time-to-live for credentials


D.

Whether the credentials will be encrypted


Expert Solution
Questions # 16:

What are two (2) access methods to the ProxySG? (Choose two.)

Options:

A.

From a smartphone running the Symantec app


B.

Via the enterprise wireless network


C.

From the front panel of the appliance


D.

A direct connection via a serial cable to the serial console


E.

From the back panel of the appliance


Expert Solution
Questions # 17:

Which log format is associated with the main log facility by default? (Choose the best answer.)

Options:

A.

http


B.

elff


C.

main


D.

bcreportermain_v1


Expert Solution
Questions # 18:

Which section of the sysinfo file would an administrator examine to see how specific components are behaving? (Choose the best answer.)

Options:

A.

Configuration


B.

Logs


C.

System state


D.

Statistics


Expert Solution
Questions # 19:

How does a server know where to retrieve the requested information when it receives a GET request method? (Choose the best answer.)

Options:

A.

The server examines the certificate of the requesting IP address


B.

The URL is in the GET request


C.

The server retrieves it from the server cache


D.

The server must return a response message requesting the URL


Expert Solution
Questions # 20:

Which two (2) categories of traffic are typically left encrypted? (Choose two.)

Options:

A.

Gambling


B.

News Media


C.

Social Media


D.

Financial Services


E.

Health


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions