Which two (2) errors are the most common certificate errors? (Choose two.)

Which two (2) errors are the most common certificate errors? (Choose two.)A . The server does NOT recognize the ProxySC . The client does NOT trust the server.D . The client does NOT trust the ProxySF . The ProxySG does NOT trust the server.G . The server does NOT trust...

September 4, 2020 No Comments READ MORE +

Which service is provided by the ProxySG? (Choose the best answer.)

Which service is provided by the ProxySG? (Choose the best answer.)A . Virus scanningB . Strong authenticationC . Edge routingD . SandboxingView AnswerAnswer: B

September 4, 2020 No Comments READ MORE +

How does the ProxySG handle a rule that contains a syntax error when the ProxySG processes installed policy as part of a client transaction? (Choose the best answer.)

How does the ProxySG handle a rule that contains a syntax error when the ProxySG processes installed policy as part of a client transaction? (Choose the best answer.)A . The ProxySG changes the transaction status to Deny and makes an entry in the event logB . The ProxySG stops processing...

September 4, 2020 No Comments READ MORE +

Which service setting determines whether the traffic is passed to the SSL proxy or the HTTP proxy when a browser is configured to use an explicit proxy connection to the ProxySG? (Choose the best answer.)

Which service setting determines whether the traffic is passed to the SSL proxy or the HTTP proxy when a browser is configured to use an explicit proxy connection to the ProxySG? (Choose the best answer.)A . Enable SSL/TLSB . Detect protocolC . Authenticate-401D . Forward client certView AnswerAnswer: B

September 4, 2020 No Comments READ MORE +

Which two (2) locations is the WebFilter database stored in? (Choose two.)

Which two (2) locations is the WebFilter database stored in? (Choose two.)A . At several data centers around the worldB . In the WebPulse data cacheC . On clients’ mobile devicesD . On a properly licensed ProxySGE . Symantec Management CenterView AnswerAnswer: AD

September 3, 2020 No Comments READ MORE +

What is typically the biggest load on a CPU when managing encrypted traffic? (Choose the best answer.)

What is typically the biggest load on a CPU when managing encrypted traffic? (Choose the best answer.)A . Emulating certificatesB . Using the SHA-2 hash functionC . Using RSA encryptionD . The need for redirectionView AnswerAnswer: A

September 2, 2020 No Comments READ MORE +

Which best describes BCAAA? (Choose the best answer.)

Which best describes BCAAA? (Choose the best answer.)A . An intermediary between the ProxySG and an authentication serverB . An application that sends sysinfo snapshots to Symantec supportC . Symantec’s internal authorization and authentication serviceD . A utility that allows a direct connection between the ProxySG and an authentication domain.View...

September 2, 2020 No Comments READ MORE +

What is the default TCP port for HTTP? (Choose the best answer.)

What is the default TCP port for HTTP? (Choose the best answer.)A . 20B . 443C . 80D . 43View AnswerAnswer: C

September 1, 2020 No Comments READ MORE +

Which two (2) categories of traffic are typically left encrypted? (Choose two.)

Which two (2) categories of traffic are typically left encrypted? (Choose two.)A . GamblingB . News MediaC . Social MediaD . Financial ServicesE . HealthView AnswerAnswer: DE

August 31, 2020 No Comments READ MORE +

Which two (2) situations might require a reverse DNS lookup? (Choose two.)

Which two (2) situations might require a reverse DNS lookup? (Choose two.)A . If the access log is enabled and a field in the access log requires a hostnameB . If both the primary and alternate forward DNS servers go downC . If primary authentication failsD . If a policy...

August 31, 2020 No Comments READ MORE +