250-430 Dumps - Pass SYMANTEC 250-430 Exam with Cheat Sheet Questions

Page 1

Symantec 250-430 Administration of Blue Coat ProxySG 6.6

Thank You for Downloading 250-430 Updated Exam Questions https://www.certs4sale.com/250-430-pdf-exam-dumps

https://www.certs4sale.com/


Version: 8.0 Question: 1 By default, HTTP traffic that is logged is recorded to which log facility? A. bcreportermain_v1 B. main C. elf D. http

Answer: B Reference: https://wikileaks.org/spyfiles/files/0/241_BLUECOAT-SGOS_CMG_5.1.4_9.pdf (p.7)

Question: 2 Which Symantec product is best suited for simultaneously administering a large number of ProxySG appliances? A. Reporter B. PacketShaper C. Content Analysis D. Management Center

Answer: A Question: 3 What stops further rule processing in a layer? A. When the final rule on the layer is reached B. When two rules match C. When a later rule contradicts an earlier rule D. The first rule in the layer that matches

Answer: D Reference: https://origin-symwisedownload.symantec.com/resources/webguides/sgos/policy/Learn/ aboutlayerandruleeval/layerguards.htm

Question: 4 When the ProxySG uses a virtual URL for user authentication, what must the virtual URL point to?

ExamsBuzz.com https://www.certs4sale.com/

2


A. The IP address of the origin content server B. A hostname that the user agent can DNS-resolve to an IP address C. None of these answers D. The IP address of the ProxySG

Answer: D Reference: https://support.symantec.com/en_US/article.TECH243088.html

Question: 5 Why is Kerberos performance better than NTLM? A. It uses less encryption B. None of these answers C. Only two round trips are required between the browser and an authentication server D. It works with later versions of Microsoft Windows

Answer: B Reference: https://origin-symwisedownload.symantec.com/resources/webguides/proxysg/certification/ authentication_webguide/Content/Topics/Authentication/Concepts/IWA_auth_protocols_co.htm

Question: 6 Where is the WebFilter database stored? (Select two) A. On clients’ mobile devices B. On a properly licensed ProxySG C. At several data centers around the world D. At third-party data centers

Answer: BC Question: 7 What does the authentication mode specify? A. The time-to-live for credentials B. The protocol used to communicate with the authentication service C. The challenge type and the accepted surrogate D. Whether the credentials will be encrypted

Answer: B Question: 8

ExamsBuzz.com https://www.certs4sale.com/

3


Which services are included in the Intelligence Services Advanced Bundle? A. Content categories B. Threat risk levels C. All of these D. Geolocation

Answer: C Reference: https://www.symantec.com/products/webfilter-intelligent-services

Question: 9 When does the ProxySG establish anSchannel? A. When a client request is first received B. When the client sends an NTLM type 2 message to ProxySG C. When IWA authentication fails D. When the client sends an NTLM type 3 message to the ProxySG

Answer: B Question: 10 Which of the following is not a VPM trigger object? A. Time B. Source C. Destination D. Service E. Action

Answer: E

ExamsBuzz.com https://www.certs4sale.com/

4


THANK YOU FOR DOWNLOADING 250-430 UPDATED EXAM QUESTIONS Note: Thanks For Trying The Demo Of Our 250-430 Exam Product Visit Our Site to Purchase the Full Set of Actual 250-430 Exam Questions With Answers.

Money Back Guarantee

Click The Link Below https://www.certs4sale.com/250-430-pdf-exam-dumps

https://www.certs4sale.com/


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.