Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

250-556 Administration of Symantec ProxySG 6.7 Questions and Answers

Questions 4

Which two (2) errors are the most common certificate errors? (Choose two.)

Options:

A.

The server does NOT recognize the ProxySG.

B.

The client does NOT trust the server.

C.

The client does NOT trust the ProxySG.

D.

The ProxySG does NOT trust the server.

E.

The server does NOT trust the client.

Buy Now
Questions 5

What are two (2) methods by which the ProxySG can detect the type of a file that is downloaded? (Choose two.)

Options:

A.

Checking the HTTP cache

B.

Performing an anti-virus scan

C.

Checking the file extension

D.

Submitting the URL to WebPulse

E.

Detecting apparent data type

Buy Now
Questions 6

Which VPM layer can be most commonly used to control decrypting of SSL traffic by authenticated username? (Choose the best answer.)

Options:

A.

SSL Authentication layer

B.

Web Authentication layer

C.

SSL Intercept layer

D.

None of these answers

Buy Now
Questions 7

Where does ProxySG object caching usually result in the most bandwidth savings? (Choose the best answer.)

Options:

A.

On the server side

B.

On the ProxySG

C.

On the client side

D.

On the enterprise WAN

Buy Now
Questions 8

Which log format is associated with the main log facility by default? (Choose the best answer.)

Options:

A.

http

B.

elff

C.

main

D.

bcreportermain_v1

Buy Now
Questions 9

Which log facility is used to log HTTP traffic by default? (Choose the best answer.)

Options:

A.

bcreportermain_v1

B.

main

C.

http

D.

elff

Buy Now
Questions 10

What allows WebPulse to provide real-time revisions to the WebFilter database? (Choose the best answer.)

Options:

A.

Dynamic categorization

B.

Creating a local database

C.

Threat risk levels

D.

Configuring application controls

Buy Now
Questions 11

Which detection method would detect a mismatch between the file name and its content type? (Choose the best answer.)

Options:

A.

Checking the MIME type

B.

Checking the file extension

C.

Checking the protocol type

D.

Inspecting the file signature

Buy Now
Questions 12

How can an administrator determine the serial number of the ProxySG in the Management Console? (Choose the best answer.)

Options:

A.

This information is not visible from the Management Console

B.

Go to Statistics > Advanced

C.

Go to Configuration > Network

D.

The serial number is contained in the top right Management Console banner

Buy Now
Questions 13

When are software workers created during an interaction between a ProxySG and a client requesting a webpage? (Choose the best answer.)

Options:

A.

At the ProxySG’s initial configuration

B.

When SGOS receives a connection request

C.

When the ProxySG first boots up

D.

When a transaction request must be fulfilled from the Internet rather than from the cache

Buy Now
Questions 14

Which kind of authentication credentials might Schannel congestion in IWA direct realms be an issue with? (Choose the best answer.)

Options:

A.

NTLM

B.

Surrogate credentials

C.

Kerberos

D.

Basic

Buy Now
Questions 15

Which two (2) methods are able to be used to regain access to the setup console if an administrator loses the password? (Choose two.)

Options:

A.

Access the ProxySG from another ProxySG

B.

Open a serial connection, and use the CLI command restore-defaults factory-defaults

C.

Use Management Center to access the setup console

D.

Use the front panel buttons and screen, if available on this model, to reset the password

E.

Press Control + ALT + DEL

Buy Now
Questions 16

What does the authentication mode specify? (Choose the best answer.)

Options:

A.

The challenge type and the accepted surrogate

B.

The protocol used to communicate with the authentication server

C.

The time-to-live for credentials

D.

Whether the credentials will be encrypted

Buy Now
Questions 17

When can more than one authentication realm be active at any given time on the ProxySG? (Choose the best answer.)

Options:

A.

Only in explicit mode

B.

Never

C.

Only in transparent mode

D.

When policy is being evaluated

Buy Now
Questions 18

Which Symantec product is best suited for simultaneously administering a large number of ProxySG appliances? (Choose the best answer.)

Options:

A.

PacketShaper

B.

Reporter

C.

Management Center

D.

Content Analysis

Buy Now
Questions 19

Which proxy service intercepts HTTPS traffic when browsers point directly to the ProxySG and Detect Protocol is enabled? (Choose the best answer.)

Options:

A.

SSL

B.

Explicit HTTP

C.

HTTPS

D.

TCP Tunnel

Buy Now
Questions 20

Which two (2) files does the VPM update on the ProxySG when policy created in the VPM is installed? (Choose two.)

Options:

A.

Local policy file

B.

Central policy file

C.

VPM-CPL file

D.

Default policy file

E.

VPM-XML file

Buy Now
Questions 21

What should an administrator utilize in policies to specify which traffic should be decrypted? (Choose the best answer.)

Options:

A.

Listeners

B.

URL categories

C.

The SSL Proxy

D.

All proxy services

Buy Now
Exam Code: 250-556
Exam Name: Administration of Symantec ProxySG 6.7
Last Update: May 5, 2026
Questions: 70

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now 250-556 testing engine

PDF (Q&A)

$43.57  $124.49
buy now 250-556 pdf