Which deployment method represents a single point of failure?
A. None of these answers
B. Inline XXX
C. Explicit
D. Transparent
What is the primary benefit of using IWA authentication realms?
A. Better performance by using NTLM credentials
B. Greater security than LDAP
C. Ability to use Kerberos credentials
D. Single sign-on experience for users
Where would you look to find a record of all of configuration changes, as well as which administrator account committed those changes?
A. Statistics > Advanced
B. Active sessions
C. Event log
D. Access log
Organize these CPL components into descending order based on how they are organized in policy.
A. Layers, rules, conditions, triggers
B. Layers, rules, triggers, conditions
C. Layers, conditions, rules, triggers
D. Triggers, conditions, rules, layers
What can you use to specify which traffic should be encrypted?
A. The SSL Proxy
B. Listeners
C. All proxy services
D. Categories
What is typically the biggest load on CPU?
A. MD5
B. Emulating certificates
C. Using RSA
D. SHA-2
Which one of these statements best describes how the ProxySG locates an object in its cache?
A. The ProxySG uses the hostname in the object's URL to determine in which cache directory the object is located
B. The ProxySG uses the first 32 bytes of the object's URL to determine in which cache directory the object is located
C. The ProxySG performs a hash against the URL of the object and uses the hash as the basis for a lookup into the table of cached objects
Which of the following is NOT a component of a log facility?
A. Log file
B. Protocol
C. Upload schedule
D. Log format
Which one of these statements best describes how policy checkpoints evaluate the installed policy on a ProxySG?
A. The Server In checkpoint decides which rules will be evaluated by the other checkpoints
B. The Client In checkpoint decides which rules will be evaluated by the other checkpoints
C. At each checkpoint, a decision is made whether to allow or deny the transaction
D. Relevant rules are evaluated at each checkpoint based on the information about the transaction that is available at that point
Where in the VPM can you create a unique instance for each certificate?
A. SSL Intercept layer
B. Web Content layer
C. SSL Access layer
D. SSL Proxy layer
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-430 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.