What happens when the ProxySG discovers a match for a rule in policy? (Choose the best answer.)
A. The ProxySG stops further processing in the layer containing the rule.
B. The ProxySG continues processing to see whether a further rule might negate the first rule.
C. It depends on the default policy configured.
D. The ProxySG stops further processing and executes the rule.
What is the primary benefit of using Integrated Windows Authentication (IWA) authentication realms? (Choose the best answer.)
A. Single sign-on experience for users
B. Better performance by using NTLM credentials
C. Ability to use Kerberos credentials
D. Greater security than LDAP
What best describes SGOS? (Choose the best answer.)
A. It is Linux-based
B. It is a custom-built operating system
C. It is a Symantec proprietary implementation of Unix
D. It is Windows-based
Where does the ProxySG get the text of the exception page, when it sends an exception page to a client? (Choose the best answer.)
A. From the VPM-XML file
B. From WebPulse
C. From the exception definition stored on the ProxySG
D. From Symantec Technical Support
Which two (2) files does the VPM update on the ProxySG when policy created in the VPM is installed? (Choose two.)
A. Local policy file
B. Central policy file
C. VPM-CPL file
D. Default policy file
E. VPM-XML file
Which two (2) items are considered external dependencies? (Choose two.)
A. Policy
B. DNS
C. CPU
D. Authentication
E. Memory
What is a drawback to utilizing apparent data types to detect the file type? (Choose the best answer.)
A. Does not block "drive-by" malware installation
B. Less accurate than HTTP content type detection
C. Presents a security risk
D. Most resource-intensive
How does a server know where to retrieve the requested information when it receives a GET request method? (Choose the best answer.)
A. The server examines the certificate of the requesting IP address
B. The URL is in the GET request
C. The server retrieves it from the server cache
D. The server must return a response message requesting the URL
What allows WebPulse to provide real-time revisions to the WebFilter database? (Choose the best answer.)
A. Dynamic categorization
B. Creating a local database
C. Threat risk levels
D. Configuring application controls
Which is responsible for detecting incoming traffic that matches specific IP addresses or subnets? (Choose the best answer.)
A. Listeners
B. Services
C. TCP tunnels
D. Proxies
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-556 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.