Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

250-440 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

250-440 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Administration of Symantec PacketShaper 11.9.1
  • Last Update: Sep 12, 2025
  • Questions and Answers: 70
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

250-440 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

250-440 Practice Exam Questions with Answers Administration of Symantec PacketShaper 11.9.1 Certification

Question # 6

What are the two (2) main functions o( the Symantec PacketShaper? (Select two)

A.

Control of network traffic

B.

Next generation firewall

C.

Network traffic visibility

D.

Increased bandwidth

E.

Secure transparent proxy

Full Access
Question # 7

Which statement accurately describes rate policies and priority policies?

A.

Priority policies are most appropriate tor interactive trafficthat is burstable

B.

Rate polices apply only to non-IP traffic

C.

Traffic classes without a specific policy assigned, are allocated no bandwidth

D.

Traffic withrate policies are applied before the priority policy

Full Access
Question # 8

Which module allows an administrator to set bandwidth minimums and maximums, control bandwidth allocation, and ensure dear streams for voice and video?

A.

Acceleration

B.

Shaping

C.

Monitoring

D.

Measurement engine

Full Access
Question # 9

Twoclasses need to be created; a Citrix class that matches traffic by client name, an HTTP class thatmatches traffic by user-agent had URL. Which command helps determine the matching rules?

A.

class criteria

B.

traffic history

C.

class capture-IDs

D.

traffic flow

Full Access
Question # 10

When would Symantec recommend backing up measurement data, using the measurement engine?

A.

Prior to a software upgrade

B.

Before returning the appliance to the manufacturer

C.

When verifying that a transfer is complete

D.

After performing a restore of the data from backups

Full Access
Question # 11

What task must an administrator perform to reset the class tree if the administrator is currently in the Sky Ul?

A.

Go to - Sky UI > Resets Page

B.

Go to - Advanced UI > Resets Page

C.

Go to - Sky UI Unit > Resets Page

D.

Go to- Advanced Ul > Unit Resets Page

Full Access
Question # 12

Which three (3) criteria are to be specified in a matching rule? (Select three)

A.

Service group

B.

Diffserv marking

C.

Traffic type

D.

SSL URL P

E.

Interface

F.

VLAN identification

Full Access
Question # 13

How are classes sorted in a traffic tree?

A.

By service precedence

B.

By priority, rate and average utilization

C.

By parent, child, and sibling relationships

D.

By server port number

Full Access
Question # 14

What doesthe Packets Size retransmitted graph display?

A.

Transmuted packets against retransmitted packets, in seven size buckets

B.

Transmitted bytes against retransmitted bytes, m line chart format

C.

Packets received on the Inbound or Outbound link, in line chart formal

D.

Packets received on the Inbound or Outbound link, in seven size buckets

Full Access
Question # 15

Which two (2) traffic types are ideal candidates for priority policies? (Select two)

A.

Telnet

B.

ICMP

C.

HTTP

D.

DNS

E.

FTP

Full Access
Question # 16

Which PacketShaper parameter could an administrator apply to the Folder class?

A.

Policy

B.

Partition

C.

Outbound/Default classification

D.

Matching rule

Full Access
Question # 17

Which option is accurate as it relates to the sysLocation parameter?

A.

It is a short string describing the physical location of the host where the server is running.

B.

It is the part of an SNMP public password referring to the physical location where the server is running.

C.

It is a string encoding routing and NAT information to enable SNMP packets to reach the host from other subnets.

D.

It is a path on an SNMP host to distinguish between many agents that may be running on that host.

Full Access
Question # 18

Refer to the exhibit.

250-440 question answer

A single web server is accessible only through SSI; it is running two different applications. The WebApp1class is created with the values shown.

Which field(other than the name) would need to change to create a class for WcbApp2 running over SSL?

A.

Service Group

B.

Device

C.

Criterion > Common Name

D.

Critenon >URL

Full Access
Question # 19

What statement accurately describes an ignore policy?

A.

With an ignore policy, traffic is ignored but still counted as part of the link traffic under management

B.

It causes PackelShaper to treat specified flows as pass-through traffic

C.

With an ignore policy, the CU must be used to review RTM

D.

It traverses the traffic tree looking for a matching traffic class

Full Access
Question # 20

A patent class has an inside IP address range. Its child class has an outside IP addressrange Afferent from the parent class'range. Which action would establish the matching rule for the child class?

A.

Do nothing, because the child class inherits the parent class' Outside IP range automatically

B.

Enter a single IP address in dotted decimal notation for the parent and child classes

C.

Specify the parent class' Outside IP range m the child class' matching rule

D.

Specify a subnet mask to mask off network address bits

Full Access
Question # 21

A network administratoris interested in protecting VoIP traffic on the network.

How can the administrator best accomplish this while maintaining visibility into overall VoIP bandwidth utilization'

A.

An administrator is unable to monitor and protect All VoIP traffic at once using a PacketShaper

B.

Create a classbased on the IP addresses of the IP phones so that alltraffic between them can be measured and controlled

C.

Use PacketShaper’s Flow Detail Record (FDR) feature to have the PacketShaper export VoIP flow data to ReportCenter

D.

Create a folder with a guaranteed minimum sue partition and move all of the VoIP related classes into the folder

Full Access