Free 250-556 Exam Braindumps (page: 8)

Page 7 of 18

In which caching technique are objects that require more server-side bandwidth and response time less likely to be deleted from the cache? (Choose the best answer.)

  1. Round robin
  2. Cost-based deletion
  3. Popularity contest
  4. Asynchronous adaptive refresh

Answer(s): D



What must the virtual URL point to, when the ProxySG utilizes a virtual URL for user authentication in a transparent deployment? (Choose the best answer.)

  1. The IP address of the origin content server
  2. The IP address of the ProxySG
  3. A hostname that the user agent can DNS-resolve to an IP address
  4. The hostname of the origin content server

Answer(s): C



What are two (2) access methods to the ProxySG? (Choose two.)

  1. From a smartphone running the Symantec app
  2. Via the enterprise wireless network
  3. From the front panel of the appliance
  4. A direct connection via a serial cable to the serial console
  5. From the back panel of the appliance

Answer(s): B,D



Which section of a policy trace would an administrator locate the original HTTP GET request in? (Choose the best answer.)

  1. Connection info
  2. HTTP section
  3. Policy decision
  4. Header

Answer(s): D






Post your Comments and Discuss Symantec 250-556 exam with other Community members:

250-556 Discussions & Posts