Certbus > Symantec > Symantec Certifications > 250-556 > 250-556 Online Practice Questions and Answers

250-556 Online Practice Questions and Answers

Questions 4

Which service is provided by the ProxySG? (Choose the best answer.)

A. Virus scanning

B. Strong authentication

C. Edge routing

D. Sandboxing

Browse 70 Q&As
Questions 5

Which two (2) categories of traffic are typically left encrypted? (Choose two.)

A. Gambling

B. News Media

C. Social Media

D. Financial Services

E. Health

Browse 70 Q&As
Questions 6

Which two (2) situations might require a reverse DNS lookup? (Choose two.)

A. If the access log is enabled and a field in the access log requires a hostname

B. If both the primary and alternate forward DNS servers go down

C. If primary authentication fails

D. If a policy trigger event requires it

E. If a forward DNS lookup fails

Browse 70 Q&As
Questions 7

In which caching technique does the ProxySG open multiple server connections to retrieve objects referenced on a web page before the client actually issues the requests for those objects? (Choose the best answer.)

A. Popularity contest

B. Cost-based deletion

C. Asynchronous adaptive refresh

D. Pipelining

Browse 70 Q&As
Questions 8

How can an administrator determine the serial number of the ProxySG in the Management Console? (Choose the best answer.)

A. This information is not visible from the Management Console

B. Go to Statistics > Advanced

C. Go to Configuration > Network

D. The serial number is contained in the top right Management Console banner

Browse 70 Q&As
Questions 9

In which caching technique are objects that require more server-side bandwidth and response time less likely to be deleted from the cache? (Choose the best answer.)

A. Round robin

B. Cost-based deletion

C. Popularity contest

D. Asynchronous adaptive refresh

Browse 70 Q&As
Questions 10

What is a drawback to utilizing apparent data types to detect the file type? (Choose the best answer.)

A. Does not block "drive-by" malware installation

B. Less accurate than HTTP content type detection

C. Presents a security risk

D. Most resource-intensive

Browse 70 Q&As
Questions 11

How does a server know where to retrieve the requested information when it receives a GET request method? (Choose the best answer.)

A. The server examines the certificate of the requesting IP address

B. The URL is in the GET request

C. The server retrieves it from the server cache

D. The server must return a response message requesting the URL

Browse 70 Q&As
Questions 12

What allows WebPulse to provide real-time revisions to the WebFilter database? (Choose the best answer.)

A. Dynamic categorization

B. Creating a local database

C. Threat risk levels

D. Configuring application controls

Browse 70 Q&As
Questions 13

Which two (2) methods are able to be used to regain access to the setup console if an administrator loses the password? (Choose two.)

A. Access the ProxySG from another ProxySG

B. Open a serial connection, and use the CLI command restore-defaults factory-defaults

C. Use Management Center to access the setup console

D. Use the front panel buttons and screen, if available on this model, to reset the password

E. Press Control + ALT + DEL

Browse 70 Q&As
Questions 14

What are the four principal policy checkpoints in the order they are reached, in a typical client HTTP request? (Choose the best answer.)

A. Client in, server out, server in, client out

B. Client in, server out, client out, server in

C. Client in, server in, client out, server out

D. Client in, server in, server out, client out

Browse 70 Q&As
Questions 15

Which deployment method represents a single point of failure? (Choose the best answer.)

A. Explicit

B. Basic

C. Transparent

D. Inline

Browse 70 Q&As
Questions 16

What are two (2) methods by which the ProxySG can detect the type of a file that is downloaded? (Choose two.)

A. Checking the HTTP cache

B. Performing an anti-virus scan

C. Checking the file extension

D. Submitting the URL to WebPulse

E. Detecting apparent data type

Browse 70 Q&As
Questions 17

When does the ProxySG establish an Schannel? (Choose the best answer.)

A. When the client sends an NTLM type 2 message to the ProxySG

B. When a client request is first received

C. When IWA authentication fails

D. When the client sends an NTLM type 3 message to the ProxySG

Browse 70 Q&As
Questions 18

Which two (2) methods are recommended to solve Schannel congestion? (Choose two.)

A. Use Kerberos authentication.

B. Use origin-cookie-redirect credentials.

C. Use special purpose agents.

D. Use NTLM credentials.

E. Use IP surrogate credentials.

Browse 70 Q&As
Exam Code: 250-556
Exam Name: Administration of Symantec ProxySG 6.7
Last Update: Mar 19, 2025
Questions: 70 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99