Symantec Certified Specialist

[PDF and VCE] Free Share 250-430 PDF Exam Preparation Materials with Real Exam Questions

Attention please! Here is the shortcut to pass your Latest 250-430 vce exam! Get yourself well prepared for the Symantec Certified Specialist Jun 09,2022 Newest 250-430 pdf Administration of Blue Coat ProxySG 6.6 exam is really a hard job. But don’t worry! We We, provides the most update 250-430 real exam questions. With We latest 250-430 dumps, you’ll pass the Symantec Certified Specialist Latest 250-430 free download Administration of Blue Coat ProxySG 6.6 exam in an easy way

We Geekcert has our own expert team. They selected and published the latest 250-430 preparation materials from Official Exam-Center.

The following are the 250-430 free dumps. Go through and check the validity and accuracy of our 250-430 dumps.Free sample questions of 250-430 free dumps are provided here. All the following questions are from the latest real 250-430 dumps.

Question 1:

Which type of authentication realm does not require communication with an external authentication server?

A. IWA realm

B. Kerberos realm

C. Local realm

Correct Answer: C


Question 2:

From the connection information section of a policy trace, you can see:

A. The time and date

B. The source IP address

C. All of these answers

D. The original HTTP GET request

Correct Answer: C


Question 3:

By default, HTTP traffic that is logged is recorded to which log facility?

A. bcreportermain_v1

B. main

C. elf

D. http

Correct Answer: B

Reference: https://wikileaks.org/spyfiles/files/0/241_BLUECOAT-SGOS_CMG_5.1.4_9.pdf (p.7)


Question 4:

What stops further rule processing in a layer?

A. When the final rule on the layer is reached

B. When two rules match

C. When a later rule contradicts an earlier rule

D. The first rule in the layer that matches

Correct Answer: D

Reference: https://origin-symwisedownload.symantec.com/resources/webguides/sgos/policy/Learn/aboutlayerandruleeval/layerguards.htm


Question 5:

Why is Kerberos performance better than NTLM?

A. It uses less encryption

B. None of these answers

C. Only two round trips are required between the browser and an authentication server

D. It works with later versions of Microsoft Windows

Correct Answer: B

Reference: https://origin-symwisedownload.symantec.com/resources/webguides/proxysg/certification/authentication_webguide/Content/Topics/Authentication/Concepts/IWA_auth_protocols_co.htm


Question 6:

Which services are included in the Intelligence Services Advanced Bundle?

A. Content categories

B. Threat risk levels

C. All of these

D. Geolocation

Correct Answer: C

Reference: https://www.symantec.com/products/webfilter-intelligent-services


Question 7:

When does the ProxySG establish an Schannel?

A. When a client request is first received

B. When the client sends an NTLM type 2 message to ProxySG

C. When IWA authentication fails

D. When the client sends an NTLM type 3 message to the ProxySG

Correct Answer: B


Question 8:

Name three methods by which client configuration can be performed in an explicit ProxySG deployment. (Choose three.)

A. Configure the user agent to point to the IP address or hostname of the ProxySG

B. Configure the user agent to point to the location of a PAC file

C. Configure the user agent to use WPAD

D. Use Symantec Management Center to configure the user agent

E. Configure forwarding hosts on the ProxySG

Correct Answer: ABC


Question 9:

If you have configured continuous uploading of access logs and the ProxySG is unable to reach the upload destination, what happens to the log entries?

A. They are uploaded in real time to the backup upload destination configured in the Management Console

B. None of these answers

C. They are stored locally until the connection is re-established, and then they are uploaded

D. They are discarded

Correct Answer: C


Question 10:

Which built-in tool would you use to monitor external resources?

A. Sysinfo

B. Health checks

C. Event log

D. SNMP

Correct Answer: D


Question 11:

SGOS is based on which other operating system?

A. Unix

B. VxWorks

C. pSOS

D. None of these answers

E. Windows

Correct Answer: A


Question 12:

Under what conditions does a policy-driven trace generate a trace?

A. Only if WebPulse is enabled

B. Only if a match is registered

C. Only if no global policy trace is enabled

D. Only if the rule to which it is associated is triggered

Correct Answer: D


Question 13:

Which of the following tests one aspect of a request against a Boolean expression of values?

A. Rules

B. Conditions

C. Layers

D. Triggers

Correct Answer: B

Reference: https://origin-symwisedownload.symantec.com/resources/webguides/managementcenter/1.9.1.1/Content/ConfigurationManagementGuide/6_Policy/list_triggers.htm


Question 14:

When a browser is configured to use an explicit proxy connection to the ProxySG, incoming HTTPS traffic from that browser is intercepted by which proxy service?

A. SSL

B. HTTPS

C. TCP Tunnel

D. Explicit HTTP

Correct Answer: B


Question 15:

A local database can be used as an alternative of what?

A. The ProxySG does not support local databases

B. Either an on-box or off-box database

C. An off-box WebFilter database only

D. An on-box database only

Correct Answer: B