Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

250-556 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

250-556 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Administration of Symantec ProxySG 6.7
  • Last Update: Sep 12, 2025
  • Questions and Answers: 70
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

250-556 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

250-556 Practice Exam Questions with Answers Administration of Symantec ProxySG 6.7 Certification

Question # 6

When must BCAAA be used? (Choose the best answer.)

A.

When an administrator needs to establish more than one Schannel to increase performance.

B.

When more than one ProxySG are deployed

C.

When the ProxySG is unable to directly utilize APIs that require traditional operating systems.

D.

When Basic credentials are used

Full Access
Question # 7

When will a policy trace report a rule processing result of “N/A”? (Choose the best answer.)

A.

When the layer containing the rule is disabled

B.

When the rule is not reached during evaluation

C.

When the rule makes no sense for the specific transaction being processed

D.

When the rule is contradicted by a subsequent rule

Full Access
Question # 8

Which diagnostic tool allows an administrator to examine how the ProxySG has applied policy to a particular request? (Choose the best answer.)

A.

Policy/Statistics

B.

Policy monitor

C.

Policy tracing

D.

Packet capture

Full Access
Question # 9

How does an administrator view policy coverage statistics? (Choose the best answer.)

A.

View the Policy Coverage statistics section of the sysinfo.

B.

Use an advanced URL.

C.

Create a dedicated layer in the VPM.

D.

Use a global policy trace.

Full Access
Question # 10

Which section of the sysinfo file would persistent data manager (PDM) information be found within? (Choose the best answer.)

A.

Configuration

B.

Statistics

C.

Logs

D.

System states

Full Access
Question # 11

Which section of a policy trace would an administrator locate the original HTTP GET request in? (Choose the best answer.)

A.

Connection info

B.

HTTP section

C.

Policy decision

D.

Header

Full Access
Question # 12

Where does ProxySG object caching usually result in the most bandwidth savings? (Choose the best answer.)

A.

On the server side

B.

On the ProxySG

C.

On the client side

D.

On the enterprise WAN

Full Access
Question # 13

Which service setting determines whether the traffic is passed to the SSL proxy or the HTTP proxy when a browser is configured to use an explicit proxy connection to the ProxySG? (Choose the best answer.)

A.

Enable SSL/TLS

B.

Detect protocol

C.

Authenticate-401

D.

Forward client cert

Full Access
Question # 14

How does the ProxySG handle a rule that contains a syntax error when the ProxySG processes installed policy as part of a client transaction? (Choose the best answer.)

A.

The ProxySG changes the transaction status to Deny and makes an entry in the event log

B.

The ProxySG stops processing of the layer containing the rule and continues with the next layer, if any

C.

This is NOT possible; rules with syntax errors are unable to be installed.

D.

The ProxySG skips the rule and does NOT change the accept or deny status of the transaction

Full Access
Question # 15

Which SGOS edition is designed for Secure Web Gateway hardware deployments? (Choose the best answer.)

A.

Proxy Edition

B.

Premium Edition

C.

MACH5 Edition

D.

Basic Edition

Full Access
Question # 16

What best describes SGOS? (Choose the best answer.)

A.

It is Linux-based

B.

It is a custom-built operating system

C.

It is a Symantec proprietary implementation of Unix

D.

It is Windows-based

Full Access
Question # 17

How does an administrator create a single group in policy that includes multiple client addresses? (Choose the best answer.)

A.

Create a combined policy object.

B.

Include the addresses in a layer guard.

C.

This can only be done using CPL.

D.

Use a dedicated layer.

Full Access
Question # 18

How does a server know where to retrieve the requested information when it receives a GET request method? (Choose the best answer.)

A.

The server examines the certificate of the requesting IP address

B.

The URL is in the GET request

C.

The server retrieves it from the server cache

D.

The server must return a response message requesting the URL

Full Access
Question # 19

Which two (2) methods are recommended to solve Schannel congestion? (Choose two.)

A.

Use Kerberos authentication.

B.

Use origin-cookie-redirect credentials.

C.

Use special purpose agents.

D.

Use NTLM credentials.

E.

Use IP surrogate credentials.

Full Access
Question # 20

Which two (2) items are considered external dependencies? (Choose two.)

A.

Policy

B.

DNS

C.

CPU

D.

Authentication

E.

Memory

Full Access
Question # 21

What is a series of sysinfo files gathered at periodic intervals called? (Choose the best answer.)

A.

Core image dump

B.

Event logs

C.

Snapshot

D.

Minicontext

Full Access