[PDF and VCE] Free Share 250-430 PDF Exam Preparation Materials with Real Exam Questions
Attention please! Here is the shortcut to pass your Latest 250-430 vce exam! Get yourself well prepared for the Symantec Certified Specialist Jun 09,2022 Newest 250-430 pdf Administration of Blue Coat ProxySG 6.6 exam is really a hard job. But don’t worry! We We, provides the most update 250-430 real exam questions. With We latest 250-430 dumps, you’ll pass the Symantec Certified Specialist Latest 250-430 free download Administration of Blue Coat ProxySG 6.6 exam in an easy way
We Geekcert has our own expert team. They selected and published the latest 250-430 preparation materials from Official Exam-Center.
The following are the 250-430 free dumps. Go through and check the validity and accuracy of our 250-430 dumps.Free sample questions of 250-430 free dumps are provided here. All the following questions are from the latest real 250-430 dumps.
Question 1:
Which type of authentication realm does not require communication with an external authentication server?
A. IWA realm
B. Kerberos realm
C. Local realm
Correct Answer: C
Question 2:
From the connection information section of a policy trace, you can see:
A. The time and date
B. The source IP address
C. All of these answers
D. The original HTTP GET request
Correct Answer: C
Question 3:
By default, HTTP traffic that is logged is recorded to which log facility?
A. bcreportermain_v1
B. main
C. elf
D. http
Correct Answer: B
Reference: https://wikileaks.org/spyfiles/files/0/241_BLUECOAT-SGOS_CMG_5.1.4_9.pdf (p.7)
Question 4:
What stops further rule processing in a layer?
A. When the final rule on the layer is reached
B. When two rules match
C. When a later rule contradicts an earlier rule
D. The first rule in the layer that matches
Correct Answer: D
Reference: https://origin-symwisedownload.symantec.com/resources/webguides/sgos/policy/Learn/aboutlayerandruleeval/layerguards.htm
Question 5:
Why is Kerberos performance better than NTLM?
A. It uses less encryption
B. None of these answers
C. Only two round trips are required between the browser and an authentication server
D. It works with later versions of Microsoft Windows
Correct Answer: B
Reference: https://origin-symwisedownload.symantec.com/resources/webguides/proxysg/certification/authentication_webguide/Content/Topics/Authentication/Concepts/IWA_auth_protocols_co.htm
Question 6:
Which services are included in the Intelligence Services Advanced Bundle?
A. Content categories
B. Threat risk levels
C. All of these
D. Geolocation
Correct Answer: C
Reference: https://www.symantec.com/products/webfilter-intelligent-services
Question 7:
When does the ProxySG establish an Schannel?
A. When a client request is first received
B. When the client sends an NTLM type 2 message to ProxySG
C. When IWA authentication fails
D. When the client sends an NTLM type 3 message to the ProxySG
Correct Answer: B
Question 8:
Name three methods by which client configuration can be performed in an explicit ProxySG deployment. (Choose three.)
A. Configure the user agent to point to the IP address or hostname of the ProxySG
B. Configure the user agent to point to the location of a PAC file
C. Configure the user agent to use WPAD
D. Use Symantec Management Center to configure the user agent
E. Configure forwarding hosts on the ProxySG
Correct Answer: ABC
Question 9:
If you have configured continuous uploading of access logs and the ProxySG is unable to reach the upload destination, what happens to the log entries?
A. They are uploaded in real time to the backup upload destination configured in the Management Console
B. None of these answers
C. They are stored locally until the connection is re-established, and then they are uploaded
D. They are discarded
Correct Answer: C
Question 10:
Which built-in tool would you use to monitor external resources?
A. Sysinfo
B. Health checks
C. Event log
D. SNMP
Correct Answer: D
Question 11:
SGOS is based on which other operating system?
A. Unix
B. VxWorks
C. pSOS
D. None of these answers
E. Windows
Correct Answer: A
Question 12:
Under what conditions does a policy-driven trace generate a trace?
A. Only if WebPulse is enabled
B. Only if a match is registered
C. Only if no global policy trace is enabled
D. Only if the rule to which it is associated is triggered
Correct Answer: D
Question 13:
Which of the following tests one aspect of a request against a Boolean expression of values?
A. Rules
B. Conditions
C. Layers
D. Triggers
Correct Answer: B
Reference: https://origin-symwisedownload.symantec.com/resources/webguides/managementcenter/1.9.1.1/Content/ConfigurationManagementGuide/6_Policy/list_triggers.htm
Question 14:
When a browser is configured to use an explicit proxy connection to the ProxySG, incoming HTTPS traffic from that browser is intercepted by which proxy service?
A. SSL
B. HTTPS
C. TCP Tunnel
D. Explicit HTTP
Correct Answer: B
Question 15:
A local database can be used as an alternative of what?
A. The ProxySG does not support local databases
B. Either an on-box or off-box database
C. An off-box WebFilter database only
D. An on-box database only
Correct Answer: B