Exam Details

  • Exam Code
    :250-430
  • Exam Name
    :Administration of Blue Coat ProxySG 6.6
  • Certification
    :Symantec Certified Specialist
  • Vendor
    :Symantec
  • Total Questions
    :70 Q&As
  • Last Updated
    :May 05, 2024

Symantec Symantec Certified Specialist 250-430 Questions & Answers

  • Question 11:

    Which deployment method represents a single point of failure?

    A. None of these answers

    B. Inline XXX

    C. Explicit

    D. Transparent

  • Question 12:

    What is the primary benefit of using IWA authentication realms?

    A. Better performance by using NTLM credentials

    B. Greater security than LDAP

    C. Ability to use Kerberos credentials

    D. Single sign-on experience for users

  • Question 13:

    Where would you look to find a record of all of configuration changes, as well as which administrator account committed those changes?

    A. Statistics > Advanced

    B. Active sessions

    C. Event log

    D. Access log

  • Question 14:

    Organize these CPL components into descending order based on how they are organized in policy.

    A. Layers, rules, conditions, triggers

    B. Layers, rules, triggers, conditions

    C. Layers, conditions, rules, triggers

    D. Triggers, conditions, rules, layers

  • Question 15:

    What can you use to specify which traffic should be encrypted?

    A. The SSL Proxy

    B. Listeners

    C. All proxy services

    D. Categories

  • Question 16:

    What is typically the biggest load on CPU?

    A. MD5

    B. Emulating certificates

    C. Using RSA

    D. SHA-2

  • Question 17:

    Which one of these statements best describes how the ProxySG locates an object in its cache?

    A. The ProxySG uses the hostname in the object's URL to determine in which cache directory the object is located

    B. The ProxySG uses the first 32 bytes of the object's URL to determine in which cache directory the object is located

    C. The ProxySG performs a hash against the URL of the object and uses the hash as the basis for a lookup into the table of cached objects

  • Question 18:

    Which of the following is NOT a component of a log facility?

    A. Log file

    B. Protocol

    C. Upload schedule

    D. Log format

  • Question 19:

    Which one of these statements best describes how policy checkpoints evaluate the installed policy on a ProxySG?

    A. The Server In checkpoint decides which rules will be evaluated by the other checkpoints

    B. The Client In checkpoint decides which rules will be evaluated by the other checkpoints

    C. At each checkpoint, a decision is made whether to allow or deny the transaction

    D. Relevant rules are evaluated at each checkpoint based on the information about the transaction that is available at that point

  • Question 20:

    Where in the VPM can you create a unique instance for each certificate?

    A. SSL Intercept layer

    B. Web Content layer

    C. SSL Access layer

    D. SSL Proxy layer

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-430 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.