Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

250-556 Symantec Administration of Symantec ProxySG 6.7 Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Symantec 250-556 Administration of Symantec ProxySG 6.7 certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 2
Total 70 questions

Which two (2) items are considered external dependencies? (Choose two.)

A.

Policy

B.

DNS

C.

CPU

D.

Authentication

E.

Memory

What is typically the biggest load on a CPU when managing encrypted traffic? (Choose the best answer.)

A.

Emulating certificates

B.

Using the SHA-2 hash function

C.

Using RSA encryption

D.

The need for redirection

When must BCAAA be used? (Choose the best answer.)

A.

When an administrator needs to establish more than one Schannel to increase performance.

B.

When more than one ProxySG are deployed

C.

When the ProxySG is unable to directly utilize APIs that require traditional operating systems.

D.

When Basic credentials are used

What needs to be enabled for the Explicit HTTP service to be able to hand off SSL traffic? (Choose the best answer.)

A.

Early Intercept

B.

Detect Protocol

C.

Port 443

D.

Enable ADN

Which two (2) methods are recommended to solve Schannel congestion? (Choose two.)

A.

Use Kerberos authentication.

B.

Use origin-cookie-redirect credentials.

C.

Use special purpose agents.

D.

Use NTLM credentials.

E.

Use IP surrogate credentials.

What are the four principal policy checkpoints in the order they are reached, in a typical client HTTP request? (Choose the best answer.)

A.

Client in, server out, server in, client out

B.

Client in, server out, client out, server in

C.

Client in, server in, client out, server out

D.

Client in, server in, server out, client out

Which section of the sysinfo file would an administrator examine to see how specific components are behaving? (Choose the best answer.)

A.

Configuration

B.

Logs

C.

System state

D.

Statistics

When will a policy trace report a rule processing result of “N/A”? (Choose the best answer.)

A.

When the layer containing the rule is disabled

B.

When the rule is not reached during evaluation

C.

When the rule makes no sense for the specific transaction being processed

D.

When the rule is contradicted by a subsequent rule

What does the SSL Proxy do by default? (Choose the best answer.)

A.

Scans traffic for malware

B.

Blocks encrypted traffic

C.

Tunnels all HTTPS traffic

D.

Intercepts all HTTPS traffic

When are software workers created during an interaction between a ProxySG and a client requesting a webpage? (Choose the best answer.)

A.

At the ProxySG’s initial configuration

B.

When SGOS receives a connection request

C.

When the ProxySG first boots up

D.

When a transaction request must be fulfilled from the Internet rather than from the cache

Where can an administrator create a new built-in exception on the ProxySG? (Choose the best answer.)

A.

An administrator is unable to do this

B.

In the Management Console

C.

In the CLI

D.

In the Visual Policy Manager

In which caching technique are objects that require more server-side bandwidth and response time less likely to be deleted from the cache? (Choose the best answer.)

A.

Round robin

B.

Cost-based deletion

C.

Popularity contest

D.

Asynchronous adaptive refresh

Which section of the sysinfo file displays information such as the number of successes and failures? (Choose the best answer.)

A.

System state statistics

B.

Logs

C.

Snapshots

D.

Health check statistics

Which detection method would detect a mismatch between the file name and its content type? (Choose the best answer.)

A.

Checking the MIME type

B.

Checking the file extension

C.

Checking the protocol type

D.

Inspecting the file signature

Which VPM layer can be most commonly used to control decrypting of SSL traffic by authenticated username? (Choose the best answer.)

A.

SSL Authentication layer

B.

Web Authentication layer

C.

SSL Intercept layer

D.

None of these answers

Which section of the sysinfo file would persistent data manager (PDM) information be found within? (Choose the best answer.)

A.

Configuration

B.

Statistics

C.

Logs

D.

System states

When does the ProxySG establish an Schannel? (Choose the best answer.)

A.

When the client sends an NTLM type 2 message to the ProxySG

B.

When a client request is first received

C.

When IWA authentication fails

D.

When the client sends an NTLM type 3 message to the ProxySG

How does a network administrator access sysinfo files? (Choose the best answer.)

A.

Through the CLI

B.

Through the Management Console

C.

By creating a sysinfo layer in the VPM

D.

Through the use of an advanced URL in a browser

Which log format is associated with the main log facility by default? (Choose the best answer.)

A.

http

B.

elff

C.

main

D.

bcreportermain_v1

What is the primary benefit of using Integrated Windows Authentication (IWA) authentication realms? (Choose the best answer.)

A.

Single sign-on experience for users

B.

Better performance by using NTLM credentials

C.

Ability to use Kerberos credentials

D.

Greater security than LDAP

Page: 1 / 2
Total 70 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved