Exam Name: Administration of Blue Coat ProxySG 6.6
Related Certification(s): Broadcom Symantec Certified Specialist Certification
Certification Provider: Broadcom
Number of 250-430 practice questions in our database:
111
(updated: 11-05-2020)
Expected 250-430 Exam Topics, as suggested by Broadcom :
- Topic 1: Describe The Functions Of A Proxy Server/ Access Online Symantec Community Resources
- Topic 2: Differentiate Proxy Servers From Firewalls/ List The Various Proxysg Models
- Topic 3: Describe The Key Features And Benefits Of The Symantec Blue Coat Proxysg/ Describe The Three Network Deployment Methods
- Topic 4: Explain How The Intercept And Bypass Settings Affect What Happens To Network Traffic Passing Through The Proxysg
- Topic 5: Explain The Function Of Common Global Proxy Service Settings/ Access The Proxysg And Perform Initial Configuration
- Topic 6: Describe The Relationship Between The Management Console And The Proxysg CLI/ Describe The Three Most Common Proxy Services
Use The Management Console To Access On-Box Help And Symantec Product Documentation/ Describe The Two SGOS Editions And Various License Types
- Topic 7: Describe The Primary Function Of The Major Areas Of The Management Console/ Understand How A Connection Is Initiated Over The Transport Layer
- Topic 8: Explain The Two Types Of HTTP Messages: Request And Response/ Understand The Functions Of Proxy Services, Listeners, And Proxy Types
- Topic 9: Describe The Relationship Among The VPM, CPL, And The Management Console, The Default Processing Order For Policy Layers And Rules
- Topic 10: Describe Triggers And Actions That Can Be Used In Writing Policy, The Main Concepts Of Web Filtering, The Primary Category Databases
- Topic 11: Understand Intelligence Services As Provided By The Global Intelligence Network/ Describe How Blue Coat Webfilter And Webpulse Work Together
- Topic 12: Describe Some Of The Considerations In Deciding What Content To Block As Possible Malware Sources/ Identify The Components Of An HTTP URL
- Topic 13: Identify The Types Of Pages That Can Be Sent To Users By Using Notify User Objects/ Describe The Function Of Notify User Objects
- Topic 14: Explain The Function And Various Components Of Built-In And Custom Exception/ Explain The Methods, Advantages, And Disadvantages Of File Type Detection
- Topic 15: Understand Geolocation And Threat Risk Levels And How They Can Be Used In/ Describe Splash Pages And Coaching Pages Using Notify User Objects In The VPM
- Topic 16: Understand The Optional Capabilities Available With SGOS/ Describe The Three Possible Roles Of The Proxysg
- Topic 17: Describe How NTLM And Kerberos Authentication Work In Both IWA Direct And IWA BCAAA Deployments/ Describe How Malware Can Be Transmitted Via HTTP
- Topic 18: Understand The Use Of IWA Realms, With Both IWA Direct And IWA BCAAA Connection Methods/ Describe The Benefits Of Enabling Authentication On The Proxysg
- Topic 19: Describe Key Components Of SSL Encryption/ Identify Default Log Facilities And Log Formats/
Describe Some Of The Legal And Security Considerations Related To Use Of The SSL Proxy/ Describe How The SSL Handshake Works
- Topic 20: Explain The Interaction Among Client Workers And Software Workers In Processing Client Request/ Describe The Category Types Available To Policy
- Topic 21: Describe Proxysg Authentication In Both Explicit And Transparent Deployment Mode/ Describe The Components Of A Proxysg Access Log Facility
- Topic 22: Describe The Fundamental Concepts And Purposes Of Proxysg Policy Transactions/ Describe, At A High Level, The Proxysg Authentication Architecture
- Topic 23: Configure The Proxysg To Process SSL Traffic According To Best Practices For Performance/ Describe How The SSL Proxy Service Handles SSL Traffic
Identify And Describe The HTTP Request And Response Headers Related To Caching/ Explain The Caching-Related Steps In A Proxysg Transaction
Currently there are no comments in this discussion, be the first to comment!