0% found this document useful (0 votes)
794 views24 pages

Bluecoat Proxy SG Dumps 250-430 Q&A-ExamArea

This document contains 30 multiple choice questions about administering and configuring the Blue Coat ProxySG appliance. The questions cover topics such as default log facilities, Symantec products for appliance administration, rule processing in layers, virtual URL configuration for authentication, Kerberos vs NTLM authentication, WebFilter database storage, and deployment methods. The answers are provided along with references to Blue Coat and Symantec documentation.

Uploaded by

atiffita
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
794 views24 pages

Bluecoat Proxy SG Dumps 250-430 Q&A-ExamArea

This document contains 30 multiple choice questions about administering and configuring the Blue Coat ProxySG appliance. The questions cover topics such as default log facilities, Symantec products for appliance administration, rule processing in layers, virtual URL configuration for authentication, Kerberos vs NTLM authentication, WebFilter database storage, and deployment methods. The answers are provided along with references to Blue Coat and Symantec documentation.

Uploaded by

atiffita
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

250-430

Administration of Blue Coat ProxySG 6.6


Exam: 250-430
Edition: 2.0

1 http://www.examarea.com
250-430

QUESTION: 1
By default, HTTP traffic that is logged is recorded to which log facility?

A. bcreportermain_v1
B. main
C. elf
D. http

Answer: B

Reference:
https://wikileaks.org/spyfiles/files/0/241_BLUECOAT-SGOS_CMG_5.1.4_9.pdf
(p.7)

QUESTION: 2
Which Symantec product is best suited for simultaneously administering a large
number of ProxySG appliances?

A. Reporter
B. PacketShaper
C. Content Analysis
D. Management Center

Answer: A

QUESTION: 3
What stops further rule processing in a layer?

A. When the final rule on the layer is reached


B. When two rules match
C. When a later rule contradicts an earlier rule
D. The first rule in the layer that matches

Answer: D

Reference:
https://www.dumpsschool.com/
https://origin-
symwisedownload.symantec.com/resources/webguides/sgos/policy/Learn/

2 http://www.examarea.com
250-430

aboutlayerandruleeval/layerguards.htm

QUESTION: 4
When the ProxySG uses a virtual URL for user authentication, what must the virtual
URL point to?

A. The IP address of the origin content server


B. A hostname that the user agent can DNS-resolve to an IP address
C. None of these answers
D. The IP address of the ProxySG

Answer: D

Reference:
https://support.symantec.com/en_US/article.TECH243088.html

QUESTION: 5
Why is Kerberos performance better than NTLM?

A. It uses less encryption


B. None of these answers
C. Only two round trips are required between the browser and an authentication
server
D. It works with later versions of Microsoft Windows

Answer: B

Reference:
https://origin-
symwisedownload.symantec.com/resources/webguides/proxysg/certification/
authentication_webguide/Content/Topics/Authentication/Concepts/IWA_auth_proto
cols_co.htm

QUESTION: 6
Where is the WebFilter database stored? (Select two)

A. On clients’ mobile devices


B. On a properly licensed ProxySG
C. At several data centers around the world

3 http://www.examarea.com
250-430

D. At third-party data centers

Answer: B, C

QUESTION: 7
What does the authentication mode specify?

A. The time-to-live for credentials


B. The protocol used to communicate with the authentication service
C. The challenge type and the accepted surrogate
D. Whether the credentials will be encrypted

Answer: B

QUESTION: 8
Which services are included in the Intelligence Services Advanced Bundle?

A. Content categories
B. Threat risk levels
C. All of these
D. Geolocation

Answer: C

Reference:
https://www.symantec.com/products/webfilter-intelligent-services

QUESTION: 9
When does the ProxySG establish anSchannel?

A. When a client request is first received


B. When the client sends an NTLM type 2 message to ProxySG
C. When IWA authentication fails
D. When the client sends an NTLM type 3 message to the ProxySG

Answer: B

4 http://www.examarea.com
250-430

QUESTION: 10
Which of the following is not a VPM trigger object?

A. Time
B. Source
C. Destination
D. Service
E. Action

Answer: E

QUESTION: 11
Name three methods by which client configuration can be performed in an explicit
ProxySG deployment.

A. Configure the user agent to point to the IP address or hostname of the ProxySG
B. Configure the user agent to point to the location of a PAC file
C. Configure the user agent to use WPAD
D. Use Symantec Management Center to configure the user agent
E. Configure forwarding hosts on the ProxySG

Answer: A, B, C

QUESTION: 12
If you have configured continuous uploading of access logs and the ProxySG is
unable to reach the upload destination, what happens to the log entries?

A. They are uploaded in real time to the backup upload destination configured in the
Management Console
B. None of these answers
C. They are stored locally until the connection is re-established, and then they are
uploaded
D. They are discarded

Answer: C

5 http://www.examarea.com
250-430

QUESTION: 13
Which built-in tool would you use to monitor external resources?

A. Sysinfo
B. Health checks
C. Event log
D. SNMP

Answer: D

QUESTION: 14
SGOS is based on which other operating system?

A. Unix
B. VxWorks
C. pSOS
D. None of these answers
E. Windows

Answer: A

QUESTION: 15
What is one drawback to using apparent data type to detect the file type?

A. Presents a security risk


B. Less accurate than HTTP content type detection
C. None of these answers
D. Most resource-intensive

Answer: D

QUESTION: 16
Why is authentication using Basic credentials typically used over HTTPS?

A. Username and password are base-64 encoded


B. No session identifier is required
C. No cookies are required

6 http://www.examarea.com
250-430

D. No other credentials are compatible with HTTPS

Answer: A

QUESTION: 17
What does each proxy service define? (Choose two.)

A. ProxySG SGOS version


B. Proxy type to use to process traffic
C. Attributes
D. Policy

Answer: B, C

QUESTION: 18
What rules in a VPM layer are being evaluated, what causes evaluation to stop and
proceed to the next layer?

A. A miss against the trigger in that rule


B. Neither a miss nor a match
C. A default policy of Deny
D. A match against the trigger in that rule

Answer: C

QUESTION: 19
How do you create a new built-in exception of the ProxySG?

A. In the Visual Policy Manager


B. You cannot do this
C. In the Management Console
D. In Content Policy Language

Answer: A

7 http://www.examarea.com
250-430

Reference:
https://origin-
symwisedownload.symantec.com/resources/webguides/proxysg/security_first_steps/
Content/PDFs/Exception_Pages_Solution.pdf

QUESTION: 20
Which SGOS edition is designed for Secure Web Gateway deployments?

A. Premium Edition
B. MACH5 edition
C. SWG Edition
D. Proxy Edition

Answer: C

Reference:
https://www.symantec.com/products/virtual-secure-web-gateway

QUESTION: 21
Which of the following are always included in both the request and response
headers?

A. Information relevant to the connection between the client and the server
B. DNS query
C. ICAP version number
D. Cipher suite

Answer: A

QUESTION: 22
Does the policy trace flag malfunctioning policy?

A. Yes
B. No

Answer: B

8 http://www.examarea.com
250-430

QUESTION: 23
When policy created in the VPM is installed, what two files does the VPM update on
the ProxySG? (Choose two.)

A. Local policy file


B. Central policy file
C. VPM-XML file
D. VPM-CPL file

Answer: C, D

QUESTION: 24
What needs to be selected for the Explicit HTTP service to be able to hand off SSL
traffic?

A. Port 443
B. Enable ADN
C. Early Intercept
D. Detect Protocol

Answer: D

Reference:
https://www.google.com/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=0ahUKEwjtw_
3pyvPbAhUHUhQK HVfIC8s
QFggmMAA&url=https%3A%2F%2F2.zoppoz.workers.dev%3A443%2Fhttps%2Forigin-
symwisedownload.symantec.com%2Fresources%2Fwebguides%
2Fproxysg%2Fsecurity_first_steps%2FContent%2FPDFs%
2FControl_HTTPS.pdf&usg=AOvVaw2SbHIePGOpEC8szeb-pNqx

QUESTION: 25
Which of the following is NOT a component of a proxy service listener?

A. Source IP address
B. Port range
C. Destination IP address
D. Proxy type

9 http://www.examarea.com
250-430

Answer: C

QUESTION: 26
In which client connection type are user agents aware that a proxy has been
deployed?

A. Explicit proxy
B. In every connection type
C. Inline
D. Transparent

Answer: A

QUESTION: 27
The ProxySG simultaneously opens multiple server connections to retrieve objects
referenced on a web page before the client actually issues the requests for those
objects. This statement best describes which ProxySG caching technique?

A. Asynchronous adaptive refresh


B. Popularity contest
C. Pipelining
D. Cost-based deletion

Answer: C

Reference:
https://origin-
symwisedownload.symantec.com/resources/webguides/proxysg/security_first_steps/
Content/Solutions/Caching/about_cache.htm

QUESTION: 28
Of the methods that the ProxySG uses to detect file type, which one is usually the
most accurate?

A. Checking the HTTP content type (or MIME type)


B. Performing an anti-virus scan
C. Detecting apparent data type
D. Checking the file extension

10 http://www.examarea.com
250-430

Answer: A

QUESTION: 29
Which deployment method represents a single point of failure?

A. None of these answers


B. Inline XXX
C. Explicit
D. Transparent

Answer: B

Reference:
https://www.symantec.com/content/dam/symantec/docs/white-papers/swg-
deploymentmethodologies-en.pdf

QUESTION: 30
If you lose the password to the setup console, which of these methods can be used to
regain access to the setup console? (Choose three.)

A. Open a serial connection, and use the CLI command restore-defaults factory-
defaults
B. Use the appliance reset button, if available on this model
C. Use the front panel buttons and screen, if available on this model, to reset the
password
D. Press Control + ALT + DEL

Answer: A, B, C

Reference:
https://wikileaks.org/spyfiles/files/0/213_BLUECOAT-
810_install_guide_4.x_5.x.pdf

QUESTION: 31
What would happen if the ProxySG did not use surrogate credentials to authenticate
users who use transparent proxy connections?

A. They would not be able to authenticate to the ProxySG


B. TheProxySG does not need to use surrogate credentials to authenticate users who

11 http://www.examarea.com
250-430

use transparent proxy connections


C. They would have to reauthenticate for each domain that they access

Answer: C

Reference:
https://origin-symwisedownload.symantec.com/resources/webguides/proxysg/6.6/
reverse_proxy_webguide/Content/Topics/Tasks/Authentication/surrogate_credential
s_co.htm

QUESTION: 32
In the Management Console, how can you determine the serial number of the
ProxySG?

A. Go to Configuration > Network


B. This information is not visible from the Management Console
C. The serial number is contained in the Management Console home link at top.
D. Go to Statistics > Advanced

Answer: C

Reference:
https://support.symantec.com/en_US/article.TECH243302.html

QUESTION: 33
Which of the following are recommended to improve CPU performance? (Choose
two.)

A. Edit the size of emulated certificates


B. Deny wildcard certificates
C. Enable DHE
D. Reduce the number of emulated certificates

Answer: A, D

QUESTION: 34
Where in the Management Console would you look to find all sessions that are being
intercepted by the services framework of the ProxySG?

12 http://www.examarea.com
250-430

A. Heartbeats
B. Maintenance > System Tools
C. Statistics > Sessions > Active Sessions
D. Advanced statistics

Answer: C

QUESTION: 35
When must BCAAA be used?

A. When you need to establish more than one Schannel to increase performance
B. When the ProxySG cannot directly use APIs that require traditional operating
systems
C. When more than one ProxySG are deployed
D. When Basic credentials are used

Answer: B

Reference:
https://origin-
symwisedownload.symantec.com/resources/webguides/packetguide/11.5/Content/
Topics/overviews/bcaaa-overview.htm

QUESTION: 36
Where does ProxySG object caching usually result in the most bandwidth savings?

A. On the server side


B. On the client side

Answer: B

Reference:
https://wikileaks.org/spyfiles/document/bluecoat/259_blue-coat-systems-proxysg-
applianceconfiguration-and/259_blue-coat-systems-proxysg-appliance-
configuration-and.pdf (46)

QUESTION: 37
Where are surrogate credentials stored?

13 http://www.examarea.com
250-430

A. On the authentication server


B. In the ProxySG authentication cache
C. In a cookie in the user’s web browser

Answer: C

QUESTION: 38
A primary difference between a proxy server and a firewall is that proxy is not
fundamentally what?

A. An edge device
B. A man-in-the-middle
C. A Layer 3 switch
D. A router

Answer: D

QUESTION: 39
What happens when the ProxySG bypasses traffic?

A. No policy can be applied


B. Only the default policy can be applied
C. The traffic is blocked
D. An exception message is displayed to the user

Answer: D

QUESTION: 40
Which two (2) services are provided by the ProxySG? (Select two)

A. Strong authentication
B. Visibility into encrypted traffic
C. Edge routing
D. Sandboxing
E. Virus scanning

Answer: A, B

14 http://www.examarea.com
250-430

QUESTION: 41
What is the advantage of an inline deployment?

A. Ease of deployment
B. More easily implement redundancy
C. Narrowing the amount of traffic to the ProxySG
D. Eliminates single point of failure

Answer: A

QUESTION: 42
Where do ProxySG administrators issue web requests from?

A. From the Management Console


B. From a browser
C. From a Java applet
D. From the Visual Policy Manager

Answer: B

QUESTION: 43
What defines the ports on which the ProxySG listens for incoming requests?

A. Policies
B. SGOS version
C. Services
D. Subscription licenses

Answer: C

QUESTION: 44
What two (2) options allow an administrator to create policy? (Select two)

A. Visual Policy Manager


B. Directly in Content Policy Language
C. Proxy services
D. In the CLI

15 http://www.examarea.com
250-430

E. In the initial configuration

Answer: A

QUESTION: 45
What two (2) components are necessary to filter web content? (Select two)

A. Content filtering database


B. SSL Proxy services
C. Configured policy
D. Local database
E. A third-party filtering application

Answer: A, C

QUESTION: 46
What allows Symantec to dynamically analyze and categorize new web content?

A. Geolocation
B. Threat risk levels
C. Application filtering
D. Global Intelligence Network

Answer: D

QUESTION: 47
What two (2) protocols can you use to upload access logs? (Select two)

A. HTTP
B. ICAP
C. FTP
D. WCCP
E. IMAP

Answer: A, C

16 http://www.examarea.com
250-430

QUESTION: 48
What provides visibility into who is going where on the network?

A. Authorization on the ProxySG


B. Authentication on the ProxySG
C. Certificate validation
D. The event log

Answer: B

QUESTION: 49
What provides an encrypted tunnel through which other protocols can pass?

A. HTTP
B. Certificate authorities
C. Secure Socket Layer
D. PKI

Answer: C

QUESTION: 50
Which built-in tool would you use to monitor external resources?

A. Sysinfo
B. Health checks
C. Event log
D. SNMP

Answer: D

QUESTION: 51
SGOS is based on which other operating system?

A. Unix
B. VxWorks
C. pSOS
D. None of these answers

17 http://www.examarea.com
250-430

E. Windows

Answer: A

QUESTION: 52
What is one drawback to using apparent data type to detect the file type?

A. Presents a security risk


B. Less accurate than HTTP content type detection
C. None of these answers
D. Most resource-intensive

Answer: D

QUESTION: 53
Why is authentication using Basic credentials typically used over HTTPS?

A. Username and password are base-64 encoded


B. No session identifier is required
C. No cookies are required
D. No other credentials are compatible with HTTPS

Answer: A

QUESTION: 54
What does each proxy service define? (Choose two.)

A. ProxySG SGOS version


B. Proxy type to use to process traffic
C. Attributes
D. Policy

Answer: B, C

QUESTION: 55
Which deployment method represents a single point of failure?

18 http://www.examarea.com
250-430

A. None of these answers


B. Inline XXX
C. Explicit
D. Transparent

Answer: B

Reference:
https://www.symantec.com/content/dam/symantec/docs/white-papers/swg-
deploymentmethodologies-en.pdf

QUESTION: 56
If you lose the password to the setup console, which of these methods can be used to
regain access to the setup console? (Choose three.)

A. Open a serial connection, and use the CLI command restore-defaults factory-
defaults
B. Use the appliance reset button, if available on this model
C. Use the front panel buttons and screen, if available on this model, to reset the
password
D. Press Control + ALT + DEL

Answer: A, B, C

Reference:
https://wikileaks.org/spyfiles/files/0/213_BLUECOAT-
810_install_guide_4.x_5.x.pdf

QUESTION: 57
What would happen if the ProxySG did not use surrogate credentials to authenticate
users who use transparent proxy connections?

A. They would not be able to authenticate to the ProxySG


B. TheProxySG does not need to use surrogate credentials to authenticate users who
use transparent proxy connections
C. They would have to reauthenticate for each domain that they access

Answer: C

19 http://www.examarea.com
250-430

Reference:
https://origin-symwisedownload.symantec.com/resources/webguides/proxysg/6.6/
reverse_proxy_webguide/Content/Topics/Tasks/Authentication/surrogate_credential
s_co.htm

QUESTION: 58
In the Management Console, how can you determine the serial number of the
ProxySG?

A. Go to Configuration > Network


B. This information is not visible from the Management Console
C. The serial number is contained in the Management home link at top.
D. Go to Statistics > Advanced

Answer: C

Reference:
https://support.symantec.com/en_US/article.TECH243302.html

QUESTION: 59
Which of the following are recommended to improve CPU performance? (Choose
two.)

A. Edit the size of emulated certificates


B. Deny wildcard certificates
C. Enable DHE
D. Reduce the number of emulated certificates

Answer: A, D

QUESTION: 60
Where in the Management Console would you look to find all sessions that are being
intercepted by the services framework of the ProxySG?

A. Heartbeats
B. Maintenance > System Tools
C. Statistics > Sessions > Active Sessions
D. Advanced statistics

20 http://www.examarea.com
250-430

Answer: C

QUESTION: 61
What rules in a VPM layer are being evaluated, what causes evaluation to stop and
proceed to the next layer?

A. A miss against the trigger in that rule


B. Neither a miss nor a match
C. A default policy of Deny
D. A match against the trigger in that rule

Answer: C

QUESTION: 62
How do you create a new built-in exception of the ProxySG?

A. In the Visual Policy Manager


B. You cannot do this
C. In the Management Console
D. In Content Policy Language

Answer: A

Reference:
https://origin-
symwisedownload.symantec.com/resources/webguides/proxysg/security_first_steps/
Content/PDFs/Exception_Pages_Solution.pdf

QUESTION: 63
Which SGOS edition is designed for Secure Web Gateway deployments?

A. Premium Edition
B. MACH5 edition
C. SWG Edition
D. Proxy Edition

Answer: C

21 http://www.examarea.com
250-430

Reference:
https://www.symantec.com/products/virtual-secure-web-gateway

QUESTION: 64
Which of the following are always included in both the request and response
headers?

A. Information relevant to the connection between the client and the server
B. DNS query
C. ICAP version number
D. Cipher suite

Answer: A

QUESTION: 65
Does the policy trace flag malfunctioning policy?

A. Yes
B. No

Answer: B

QUESTION: 66
When policy created in the VPM is installed, what two files does the VPM update on
the ProxySG? (Choose two.)

A. Local policy file


B. Central policy file
C. VPM-XML file
D. VPM-CPL file

Answer: C, D

QUESTION: 67
What needs to be selected for the Explicit HTTP service to be able to hand off SSL
traffic?

22 http://www.examarea.com
250-430

A. Port 443
B. Enable ADN
C. Early
D. Detect Protocol

Answer: D

QUESTION: 68
Which of the following are recommended to improve CPU performance? (Choose
two.)

A. Edit the size of emulated certificates


B. Deny wildcard certificates
C. Enable DHE
D. Reduce the number of emulated certificates

Answer: A, D

QUESTION: 69
Where in the Management Console would you look to find all sessions that are being
intercepted by the services framework of the ProxySG?

A. Heartbeats
B. Maintenance > System Tools
C. Statistics > Sessions > Active Sessions
D. Advanced statistics

Answer: C

QUESTION: 70
When must BCAAA be used?

A. When you need to establish more than one Schannel to increase performance
B. When the ProxySG cannot directly use APIs that require traditional operating
systems
C. When more than one ProxySG are deployed
D. When Basic credentials are used

23 http://www.examarea.com
250-430

Answer: B

Reference:
https://origin-
symwisedownload.symantec.com/resources/webguides/packetguide/11.5/Content/
Topics/overviews/bcaaa-overview.htm

24 http://www.examarea.com

You might also like