250-556 Administration of Symantec ProxySG 6.7 exam is a hot Symantec certification exam, Exam4Training offers you the latest free online 250-556 dumps to practice. You can get online training in the following questions, all these questions are verified by Symantec experts. If this exam changed, we will share new update questions.
Which two (2) errors are the most common certificate errors? (Choose two.) A . The server does NOT recognize the ProxyS C . The client does NOT trust the server. D . The client does NOT trust the ProxyS F . The ProxySG does NOT trust the server. G . The server does NOT trust the client.
How does the ProxySG handle a rule that contains a syntax error when the ProxySG processes installed policy as part of a client transaction? (Choose the best answer.) A . The ProxySG changes the transaction status to Deny and makes an entry in the event log B . The ProxySG stops processing of the layer containing the rule and continues with the next layer, if any C . This is NOT possible; rules with syntax errors are unable to be installed. D . The ProxySG skips the rule and does NOT change the accept or deny status of the transaction
Which service setting determines whether the traffic is passed to the SSL proxy or the HTTP proxy when a browser is configured to use an explicit proxy connection to the ProxySG? (Choose the best answer.) A . Enable SSL/TLS B . Detect protocol C . Authenticate-401 D . Forward client cert
Which two (2) locations is the WebFilter database stored in? (Choose two.) A . At several data centers around the world B . In the WebPulse data cache C . On clients’ mobile devices D . On a properly licensed ProxySG E . Symantec Management Center
What is typically the biggest load on a CPU when managing encrypted traffic? (Choose the best answer.) A . Emulating certificates B . Using the SHA-2 hash function C . Using RSA encryption D . The need for redirection
Which best describes BCAAA? (Choose the best answer.) A . An intermediary between the ProxySG and an authentication server B . An application that sends sysinfo snapshots to Symantec support C . Symantec’s internal authorization and authentication service D . A utility that allows a direct connection between the ProxySG and an authentication domain.
Which two (2) situations might require a reverse DNS lookup? (Choose two.) A . If the access log is enabled and a field in the access log requires a hostname B . If both the primary and alternate forward DNS servers go down C . If primary authentication fails D . If a policy trigger event requires it E . If a forward DNS lookup fails