[Newest Version] Free 250-430 PDF and Exam Questions Download 100% Pass Exam

Tens of thousands of competitors, pages of hard questions and unsatisfied exam preparation situations… Do not worried about all those annoying things! We, help you with your Symantec Certified Specialist 250-430 Administration of Blue Coat ProxySG 6.6 exam. We will assist you clear the 250-430 exam with Symantec Certified Specialist latest 250-430 dumps. We 250-430 new questions are the most comprehensive ones.

Visit our site to get more 250-430 Q and As:https://www.itexamfun.com/250-430.html (70 QAs Dumps)
Question 1:

What can proxy servers do? (Choose three.)

A. Rewrite request messages

B. Interpret request messages

C. Block malicious content

D. Scan traffic for viruses

Correct Answer: ACD

Reference: https://origin-symwisedownload.symantec.com/resources/webguides/proxysg/security_first_steps/Content/PDFs/Malware_Prevention_Solution.pdf

Question 2:

A newly-shipped physical ProxySG contains what type of license?

A. Trial

B. Demo

C. Permanent

D. Provisional

Correct Answer: A

Reference: https://origin-symwisedownload.symantec.com/resources/webguides/proxysg/6.2/acceleration_webguide/Content/02Tasks/Maintenance/view_license_information_ta.htm

Question 3:

Which Symantec product is best suited for simultaneously administering a large number of ProxySG appliances?

A. Reporter

B. PacketShaper

C. Content Analysis

D. Management Center

Correct Answer: A

Question 4:

Where is the WebFilter database stored? (Choose two.)

A. On clients\’ mobile devices

B. On a properly licensed ProxySG

C. At several data centers around the world

D. At third-party data centers

Correct Answer: BC

Question 5:

When does the ProxySG establish an Schannel?

A. When a client request is first received

B. When the client sends an NTLM type 2 message to ProxySG

C. When IWA authentication fails

D. When the client sends an NTLM type 3 message to the ProxySG

Correct Answer: B

Question 6:

Name three methods by which client configuration can be performed in an explicit ProxySG deployment. (Choose three.)

A. Configure the user agent to point to the IP address or hostname of the ProxySG

B. Configure the user agent to point to the location of a PAC file

C. Configure the user agent to use WPAD

D. Use Symantec Management Center to configure the user agent

E. Configure forwarding hosts on the ProxySG

Correct Answer: ABC

Question 7:

If you have configured continuous uploading of access logs and the ProxySG is unable to reach the upload destination, what happens to the log entries?

A. They are uploaded in real time to the backup upload destination configured in the Management Console

B. None of these answers

C. They are stored locally until the connection is re-established, and then they are uploaded

D. They are discarded

Correct Answer: C

Question 8:

SGOS is based on which other operating system?

A. Unix

B. VxWorks


D. None of these answers

E. Windows

Correct Answer: A

Question 9:

When will a policy trace report a rule processing result of “N/A”?

A. When the rule is not reached during evaluation

B. When the rule makes no sense for the specific transaction being processed

C. When the layer containing the rule is disabled

Correct Answer: A

Question 10:

SGOS is which of the following?

A. Linux-based

B. Windows-based

C. A custom-built operating system

D. A Symantec proprietary implementation of Unix

Correct Answer: C

Question 11:

What does the SSL Proxy do by default?

A. Blocks encrypted traffic

B. Scans traffic for malware

C. Tunnels all HTTPS traffic

D. Intercepts all HTTPS traffic

Correct Answer: C

Reference: https://wikileaks.org/spyfiles/files/0/219_BLUECOAT-SGOS_5.3.x_SSL_Proxy_Reference_Guide.pdf

Question 12:

What rules in a VPM layer are being evaluated, what causes evaluation to stop and proceed to the next layer?

A. A miss against the trigger in that rule

B. Neither a miss nor a match

C. A default policy of Deny

D. A match against the trigger in that rule

Correct Answer: C

Question 13:

Which of the following are always included in both the request and response headers?

A. Information relevant to the connection between the client and the server

B. DNS query

C. ICAP version number

D. Cipher suite

Correct Answer: A

Question 14:

Does the policy trace flag malfunctioning policy?

A. Yes

B. No

Correct Answer: B

Question 15:

When policy created in the VPM is installed, what two files does the VPM update on the ProxySG? (Choose two.)

A. Local policy file

B. Central policy file

C. VPM-XML file

D. VPM-CPL file

Correct Answer: CD

Visit our site to get more 250-430 Q and As:https://www.itexamfun.com/250-430.html (70 QAs Dumps)