When does the ProxySG establish an Schannel?
A. When a client request is first received
B. When the client sends an NTLM type 2 message to ProxySG
C. When IWA authentication fails
D. When the client sends an NTLM type 3 message to the ProxySG
Which of the following is not a VPM trigger object?
A. Time
B. Source
C. Destination
D. Service
E. Action
Name three methods by which client configuration can be performed in an explicit ProxySG deployment. (Choose three.)
A. Configure the user agent to point to the IP address or hostname of the ProxySG
B. Configure the user agent to point to the location of a PAC file
C. Configure the user agent to use WPAD
D. Use Symantec Management Center to configure the user agent
E. Configure forwarding hosts on the ProxySG
If you have configured continuous uploading of access logs and the ProxySG is unable to reach the upload destination, what happens to the log entries?
A. They are uploaded in real time to the backup upload destination configured in the Management Console
B. None of these answers
C. They are stored locally until the connection is re-established, and then they are uploaded
D. They are discarded
Which services are included in the Intelligence Services Advanced Bundle?
A. Content categories
B. Threat risk levels
C. All of these
D. Geolocation
Where is the WebFilter database stored? (Choose two.)
A. On clients' mobile devices
B. On a properly licensed ProxySG
C. At several data centers around the world
D. At third-party data centers
What does the authentication mode specify?
A. The time-to-live for credentials
B. The protocol used to communicate with the authentication service
C. The challenge type and the accepted surrogate
D. Whether the credentials will be encrypted
Why is Kerberos performance better than NTLM?
A. It uses less encryption
B. None of these answers
C. Only two round trips are required between the browser and an authentication server
D. It works with later versions of Microsoft Windows
When the ProxySG uses a virtual URL for user authentication, what must the virtual URL point to?
A. The IP address of the origin content server
B. A hostname that the user agent can DNS-resolve to an IP address
C. None of these answers
D. The IP address of the ProxySG
Which Symantec product is best suited for simultaneously administering a large number of ProxySG appliances?
A. Reporter
B. PacketShaper
C. Content Analysis
D. Management Center
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-430 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.