Download Administration of Blue Coat ProxySG 6.6.250-430.PracticeTest.2018-08-07.35q.vcex

Vendor: Symantec
Exam Code: 250-430
Exam Name: Administration of Blue Coat ProxySG 6.6
Date: Aug 07, 2018
File Size: 18 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
By default, HTTP traffic that is logged is recorded to which log facility?
  1. bcreportermain_v1
  2. main
  3. elf
  4. http
Correct answer: B
Explanation:
Reference: https://wikileaks.org/spyfiles/files/0/241_BLUECOAT-SGOS_CMG_5.1.4_9.pdf (p.7)
Reference: https://wikileaks.org/spyfiles/files/0/241_BLUECOAT-SGOS_CMG_5.1.4_9.pdf (p.7)
Question 2
Which Symantec product is best suited for simultaneously administering a large number of ProxySG appliances?
  1. Reporter
  2. PacketShaper
  3. Content Analysis
  4. Management Center
Correct answer: A
Question 3
What stops further rule processing in a layer?
  1. When the final rule on the layer is reached
  2. When two rules match
  3. When a later rule contradicts an earlier rule
  4. The first rule in the layer that matches
Correct answer: D
Explanation:
Reference: https://origin-symwisedownload.symantec.com/resources/webguides/sgos/policy/Learn/aboutlayerandruleeval/layerguards.htm
Reference: https://origin-symwisedownload.symantec.com/resources/webguides/sgos/policy/Learn/aboutlayerandruleeval/layerguards.htm
Question 4
When the ProxySG uses a virtual URL for user authentication, what must the virtual URL point to?
  1. The IP address of the origin content server
  2. A hostname that the user agent can DNS-resolve to an IP address
  3. None of these answers
  4. The IP address of the ProxySG
Correct answer: D
Explanation:
Reference: https://support.symantec.com/en_US/article.TECH243088.html
Reference: https://support.symantec.com/en_US/article.TECH243088.html
Question 5
Why is Kerberos performance better than NTLM?
  1. It uses less encryption
  2. None of these answers
  3. Only two round trips are required between the browser and an authentication server
  4. It works with later versions of Microsoft Windows
Correct answer: B
Explanation:
Reference: https://origin-symwisedownload.symantec.com/resources/webguides/proxysg/certification/authentication_webguide/Content/Topics/Authentication/Concepts/IWA_auth_protocols_co.htm
Reference: https://origin-symwisedownload.symantec.com/resources/webguides/proxysg/certification/authentication_webguide/Content/Topics/Authentication/Concepts/IWA_auth_protocols_co.htm
Question 6
Which services are included in the Intelligence Services Advanced Bundle?
  1. Content categories
  2. Threat risk levels
  3. All of these
  4. Geolocation
Correct answer: C
Explanation:
Reference: https://www.symantec.com/products/webfilter-intelligent-services
Reference: https://www.symantec.com/products/webfilter-intelligent-services
Question 7
When does the ProxySG establish an Schannel?
  1. When a client request is first received
  2. When the client sends an NTLM type 2 message to ProxySG
  3. When IWA authentication fails
  4. When the client sends an NTLM type 3 message to the ProxySG
Correct answer: B
Question 8
Which of the following is not a VPM trigger object?
  1. Time
  2. Source
  3. Destination
  4. Service
  5. Action
Correct answer: E
Question 9
Name three methods by which client configuration can be performed in an explicit ProxySG deployment.
  1. Configure the user agent to point to the IP address or hostname of the ProxySG
  2. Configure the user agent to point to the location of a PAC file
  3. Configure the user agent to use WPAD
  4. Use Symantec Management Center to configure the user agent
  5. Configure forwarding hosts on the ProxySG
Correct answer: ABC
Question 10
If you have configured continuous uploading of access logs and the ProxySG is unable to reach the upload destination, what happens to the log entries?
  1. They are uploaded in real time to the backup upload destination configured in the Management Console
  2. None of these answers
  3. They are stored locally until the connection is re-established, and then they are uploaded
  4. They are discarded
Correct answer: C
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!