Pass4itsure > Symantec > Symantec Certified Specialist > 250-430 > 250-430 Online Practice Questions and Answers

250-430 Online Practice Questions and Answers

Questions 4

From the connection information section of a policy trace, you can see:

A. The time and date

B. The source IP address

C. All of these answers

D. The original HTTP GET request

Buy Now
Questions 5

By default, HTTP traffic that is logged is recorded to which log facility?

A. bcreportermain_v1

B. main

C. elf

D. http

Buy Now
Questions 6

Where is the WebFilter database stored? (Choose two.)

A. On clients' mobile devices

B. On a properly licensed ProxySG

C. At several data centers around the world

D. At third-party data centers

Buy Now
Questions 7

Under what conditions does a policy-driven trace generate a trace?

A. Only if WebPulse is enabled

B. Only if a match is registered

C. Only if no global policy trace is enabled

D. Only if the rule to which it is associated is triggered

Buy Now
Questions 8

When the disk space on a ProxySG is full, what features or functions become unavailable?

A. Health checks

B. None; this is a normal condition

C. Event log

D. Policy tracing

Buy Now
Questions 9

What rules in a VPM layer are being evaluated, what causes evaluation to stop and proceed to the next layer?

A. A miss against the trigger in that rule

B. Neither a miss nor a match

C. A default policy of Deny

D. A match against the trigger in that rule

Buy Now
Questions 10

Which of the following is NOT a component of a proxy service listener?

A. Source IP address

B. Port range

C. Destination IP address

D. Proxy type

Buy Now
Questions 11

The ProxySG simultaneously opens multiple server connections to retrieve objects referenced on a web page before the client actually issues the requests for those objects. This statement best describes which ProxySG caching technique?

A. Asynchronous adaptive refresh

B. Popularity contest

C. Pipelining

D. Cost-based deletion

Buy Now
Questions 12

What is typically the biggest load on CPU?

A. MD5

B. Emulating certificates

C. Using RSA

D. SHA-2

Buy Now
Questions 13

If you lose the password to the setup console, which of these methods can be used to regain access to the setup console? (Choose three.)

A. Open a serial connection, and use the CLI command restore-defaults factory-defaults

B. Use the appliance reset button, if available on this model

C. Use the front panel buttons and screen, if available on this model, to reset the password

D. Press Control + ALT + DEL

Buy Now
Exam Code: 250-430
Exam Name: Administration of Blue Coat ProxySG 6.6
Last Update: Apr 17, 2024
Questions: 70
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99