Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

250-440 Symantec Administration of Symantec PacketShaper 11.9.1 Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Symantec 250-440 Administration of Symantec PacketShaper 11.9.1 certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 2
Total 70 questions

Which steps will produce the data required to create an application-specific matching rule?

A.

Use class criteria track to enable tracking on a specific class and then use class criteria recent to see a list of recent values for the class

B.

Use class criteria attributes to see attributes for a specific class and then use class criteria recent to see alist of recent values for the class

C.

Use class criteria trade toenable tracking on a specific class and to see a list of recent values for the class

D.

Use class criteria attributes to see attributes fora specific class and then use class criteria track to track the recent values for the class

What is required on the network to allow classification of traffic flow by a specific user?

A.

Install theBlue Coat Authentication and Authorization Agent (BCAAA) on a separate server.

B.

Nothing. Users are automatically discovered by your PacketShaper.

C.

Enable Users and Groups on the PacketShaper Setup page.

D.

Install the Blue Coat Authentication and Authorization Agent (BCAAA) on your PacketShaper appliance.

Which element is missing from this class lest statement?

# class test outbound 10.0.0.200:21 10.0.12.100:2000

A.

Partition

B.

Policy

C.

Protocol

D.

Traffic class

Refer to the exhibit.

Which PacketShaper feature is shown here?

A.

The Manage tab, displaying the ten classes that were tested against various protocols in the past week

B.

The Top Ten tab, displaying the ten classes that generated the most traffic in the past hour

C.

The Monitor tab, displaying real-time traffic and bandwidth data

D.

The Top Ten tab, displaying the average packet exchange time in milliseconds for the top ten classes in the past day

Which feature does PacketShaper use to control the rate lot User Datagram Protocol (UDP) traffic?

A.

PacketShaper's techniques in rate control and queuing

B.

PacketShapet's TTL headers

C.

Priority policies that allocate bandwidth based on UDP traffic

D.

Window size

Traffic from a single internal server contains bandwidth peaking at 750K and averaging at 350K during sessions.

What information would anadministrate utilize to determine the rates to specify in a guaranteed rate policy for the traffic class?

A.

Output from the setup show command to determine the PacketShaper's configuration limits

B.

An ASCII fie saved in the 9.256/cmd directory

C.

Output from the trafficflow command to see how many concurrent flows of a specific type are present

D.

Output from the ver ver command, which isdivided into non-sharable and sharable settings

What statement accurately describes Folder classes and Default classes?

A.

Folder classes are used for exceptions, and Default classes are used to define how matches for traffic flows are found

B.

Folder classes are used for organization, and Default classes are used to catch unclassified traffic

C.

Folder classes and Default classes always share the same parent classes

D.

Folder classes are used to catch unclassified traffic, and Default classes are used for organization

Why is Layer 5 through 7 traffic grouped together in the PacketShaper?

A.

To work more easily with the Citrix priority tags

B.

For ease of use with FTP, which is labeled by file name or extension

C.

Because NNTP appears only by name or type of news group

D.

To use for application classification

Which three (3) criteria are to be specified in a matching rule? (Select three)

A.

Service group

B.

Diffserv marking

C.

Traffic type

D.

SSL URL P

E.

Interface

F.

VLAN identification

What statement accurately describes an ignore policy?

A.

With an ignore policy, traffic is ignored but still counted as part of the link traffic under management

B.

It causes PackelShaper to treat specified flows as pass-through traffic

C.

With an ignore policy, the CU must be used to review RTM

D.

It traverses the traffic tree looking for a matching traffic class

Which statement accurately describes rate policies and priority policies?

A.

Priority policies are most appropriate tor interactive trafficthat is burstable

B.

Rate polices apply only to non-IP traffic

C.

Traffic classes without a specific policy assigned, are allocated no bandwidth

D.

Traffic withrate policies are applied before the priority policy

Which module allows an administrator to set bandwidth minimums and maximums, control bandwidth allocation, and ensure dear streams for voice and video?

A.

Acceleration

B.

Shaping

C.

Monitoring

D.

Measurement engine

An administratorsuspects that the primary BlueCoat Authentication and Authorization Agent (BCAAA) server has stopped functioning.When checking the status of UserAwarenesson the Setup > User Awareness page, the status message "In use" is displayed on the page.

What does the status "in use" mean?

A.

The server is up. PadwtShaper has connected to the serverand can look up users.

B.

The server is busy. PacketShapercan't connect to It until it is freed up.

C.

You configured the wrongIP address ofthe BCAA server on the PackefShaper. PacketShaper c3nl connect to the server.

D.

The server is up. PacketShaper can connect to this server, but isusing an alternate BCAAA serveron your network.

After insulting a PacketShaper inline between a switch anda router, communications are slow.

Which command, executed repeatedly, can helpto determine it there ate errorson the PacketShaper interfaces?

A.

link show

B.

net nic

C.

tap health

D.

traffic flow

What partitions could an administrator apply to a class in the Sky UI?

A.

You can apply any supported partitions and policies from the Sky UI

B.

You can apply any supported partition from the Sky UI, but you must apply policies from the Advanced UI

C.

You cannot apply them from the Sky Ul, you must use the Advanced UI to apply policies and partitions

D.

You can apply static or dynamic partitions, but not burstable ones from the Sky UI

Which CLI command will display the current rate and connection information about active hosts?

A.

hostdb hosts

B.

hostdb accounting

C.

hostdb info

D.

hostdb show

Refer to the exhibit.

Which task must the administrator perform to make sure that traffic between (he IAN and DMZ is treated as pass-through PacketShaper installed as shown?

A.

Create a class for LAN-to-DMZ traffic and apply a 100 MB partition to it. ..

B.

Create a class for lANto-OMZ traffic and apply a 100-MB rate policy to it.

C.

Create a class for lAN-tO-DMZ traffic and apply an ignore policy to it.

D.

Configure the PacketShapet to automatically identify Inside and Outside hosts, therefor* no special configuration is required.

Which two (2) traffic types are ideal candidates for priority policies? (Select two)

A.

Telnet

B.

ICMP

C.

HTTP

D.

DNS

E.

FTP

What do instances of bold text in the PacfcetShapet Wffie lice represent?

A.

Default Policy

B.

Policy that n actively being used

C.

Policythat was changed during the current session

D.

Inheritable Policy

Which statement accurately describes the PacketShaper measurement engine?

A.

It collects histogram data that can be backed up to the PacketShaper

B.

Its data is stored in tab-delimited lists

C.

It collects histogram data that can be exported to a die

D.

It Is a background process that collects traffic tree data

Page: 1 / 2
Total 70 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved