Broadcom 250-556 Symantec ProxySG 6.7 Technical Specialist Exam Practice Test

Page: 1 / 14
Total 70 questions
Question 1

Which VPM layer can be most commonly used to control decrypting of SSL traffic by authenticated username? (Choose the best answer.)



Answer : C


Question 2

What are two (2) methods by which the ProxySG can detect the type of a file that is downloaded? (Choose two.)



Answer : C, E


Question 3

In which type of physical deployment does a ProxySG have potential visibility to all traffic through the use of a device such as WCCP-capable router or a Layer 4 switch? (Choose the best answer.)



Answer : A


Question 4

What results when the ProxySG bypasses traffic in explicit mode? (Choose the best answer.)



Answer : A


Question 5

What does the authentication mode specify? (Choose the best answer.)



Answer : A


Question 6

How does a server know where to retrieve the requested information when it receives a GET request method? (Choose the best answer.)



Answer : B


Question 7

What is a drawback to utilizing apparent data types to detect the file type? (Choose the best answer.)



Answer : D


Page:    1 / 14   
Total 70 questions