Symantec 250-556 practice test

Administration of Symantec ProxySG 6.7 Exam


Question 1

Which detection method would detect a mismatch between the file name and its content type?
(Choose the best answer.)

  • A. Checking the MIME type
  • B. Checking the file extension
  • C. Checking the protocol type
  • D. Inspecting the file signature
Answer:

B

Discussions

Question 2

Which two (2) methods are recommended to solve Schannel congestion? (Choose two.)

  • A. Use Kerberos authentication.
  • B. Use origin-cookie-redirect credentials.
  • C. Use special purpose agents.
  • D. Use NTLM credentials.
  • E. Use IP surrogate credentials.
Answer:

AD

Discussions

Question 3

When are software workers created during an interaction between a ProxySG and a client requesting
a webpage? (Choose the best answer.)

  • A. At the ProxySG’s initial configuration
  • B. When SGOS receives a connection request
  • C. When the ProxySG first boots up
  • D. When a transaction request must be fulfilled from the Internet rather than from the cache
Answer:

B

Discussions

Question 4

When does the ProxySG establish an Schannel? (Choose the best answer.)

  • A. When the client sends an NTLM type 2 message to the ProxySG
  • B. When a client request is first received
  • C. When IWA authentication fails
  • D. When the client sends an NTLM type 3 message to the ProxySG
Answer:

A

Discussions

Question 5

What does the SSL Proxy do by default? (Choose the best answer.)

  • A. Scans traffic for malware
  • B. Blocks encrypted traffic
  • C. Tunnels all HTTPS traffic
  • D. Intercepts all HTTPS traffic
Answer:

C

Discussions

Question 6

Which proxy service intercepts HTTPS traffic when browsers point directly to the ProxySG and Detect
Protocol is enabled? (Choose the best answer.)

  • A. SSL
  • B. Explicit HTTP
  • C. HTTPS
  • D. TCP Tunnel
Answer:

B

Discussions

Question 7

What needs to be enabled for the Explicit HTTP service to be able to hand off SSL traffic? (Choose the
best answer.)

  • A. Early Intercept
  • B. Detect Protocol
  • C. Port 443
  • D. Enable ADN
Answer:

B

Discussions

Question 8

How do policy checkpoints evaluate the installed policy on a ProxySG? (Choose the best answer.)

  • A. At each checkpoint, a decision is made whether to allow or deny the transaction
  • B. The Server In checkpoint decides which rules will be evaluated by the other checkpoints
  • C. Relevant rules are evaluated at each checkpoint based on the information about the transaction that is available at that point
  • D. The Client In checkpoint decides which rules will be evaluated by the other checkpoints
Answer:

C

Discussions

Question 9

Which VPM layer can be most commonly used to control decrypting of SSL traffic by authenticated
username? (Choose the best answer.)

  • A. SSL Authentication layer
  • B. Web Authentication layer
  • C. SSL Intercept layer
  • D. None of these answers
Answer:

C

Discussions

Question 10

What are two (2) methods by which the ProxySG can detect the type of a file that is downloaded?
(Choose two.)

  • A. Checking the HTTP cache
  • B. Performing an anti-virus scan
  • C. Checking the file extension
  • D. Submitting the URL to WebPulse
  • E. Detecting apparent data type
Answer:

CE

Discussions
To page 2