How does an administrator create a single group in policy that includes multiple client addresses? (Choose the best answer.)
A. Create a combined policy object.
B. Include the addresses in a layer guard.
C. This can only be done using CPL.
D. Use a dedicated layer.
Which type of object is a Notify User object in the VPM? (Choose the best answer.)
A. Destination
B. Action
C. Track
D. Source
Which two (2) situations might require a reverse DNS lookup? (Choose two.)
A. If the access log is enabled and a field in the access log requires a hostname
B. If both the primary and alternate forward DNS servers go down
C. If primary authentication fails
D. If a policy trigger event requires it
E. If a forward DNS lookup fails
What is the default TCP port for HTTP? (Choose the best answer.)
A. 20
B. 443
C. 80
D. 43
What is a component of a proxy service listener? (Choose the best answer.)
A. Encryption hash
B. Source IP address
C. Proxy mode
D. Proxy type
Which service is provided by the ProxySG? (Choose the best answer.)
A. Virus scanning
B. Strong authentication
C. Edge routing
D. Sandboxing
Which best describes BCAAA? (Choose the best answer.)
A. An intermediary between the ProxySG and an authentication server
B. An application that sends sysinfo snapshots to Symantec support
C. Symantec's internal authorization and authentication service
D. A utility that allows a direct connection between the ProxySG and an authentication domain.
Which two (2) categories of traffic are typically left encrypted? (Choose two.)
A. Gambling
B. News Media
C. Social Media
D. Financial Services
E. Health
When must BCAAA be used? (Choose the best answer.)
A. When an administrator needs to establish more than one Schannel to increase performance.
B. When more than one ProxySG are deployed
C. When the ProxySG is unable to directly utilize APIs that require traditional operating systems.
D. When Basic credentials are used
When will a policy trace report a rule processing result of "N/A"? (Choose the best answer.)
A. When the layer containing the rule is disabled
B. When the rule is not reached during evaluation
C. When the rule makes no sense for the specific transaction being processed
D. When the rule is contradicted by a subsequent rule
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-556 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.