Use this quick start guide to collect all the information about Broadcom ProxySG Technical (250-556) Certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the 250-556 Symantec ProxySG Technical Specialist exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual Broadcom ProxySG Technical certification exam.
The Broadcom ProxySG Technical certification is mainly targeted to those candidates who want to build their career in Network Security domain. The Broadcom Symantec ProxySG 6.7 Technical Specialist exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of Broadcom ProxySG Technical.
Broadcom ProxySG Technical Exam Summary:
Exam Name | Broadcom Symantec ProxySG 6.7 Technical Specialist |
Exam Code | 250-556 |
Exam Price | $250 (USD) |
Duration | 90 mins |
Number of Questions | 65-75 |
Passing Score | 70% |
Books / Training |
ProxySG 6.7 Basic Administration ProxySG 6.7 Advanced Administration ProxySG 6.7 Diagnostics and Troubleshooting |
Schedule Exam | Pearson VUE |
Sample Questions | Broadcom ProxySG Technical Sample Questions |
Practice Exam | Broadcom 250-556 Certification Practice Exam |
Broadcom 250-556 Exam Syllabus Topics:
Topic | Details |
---|---|
Introduction to the Symantec ProxySG Secure Web Gateway |
- Describe the functions of a proxy server - Differentiate proxy serversfrom firewalls - Describe the key features and benefits of the Symantec ProxySG - List the various ProxySG models - Access online Symantec community resources |
ProxySG Security Deployment Options |
- Describe the three network deployment options - Describe the three possible roles of the ProxySG |
ProxySG Management Console |
- Describe the relationship between the Management Console and the ProxySG CLI - Describe the primary function of the major areas ofthe Management Console - Use the Management Console to access on-boxhelp and Symantec product documentation |
Traffic Interception using Proxy Services |
- Understand the functions of proxy services,listeners, and proxy types - Describe the three most common proxy services - Explain how the intercept and bypass settings affect what happens to network traffic passingthrough the ProxySG |
Hypertext Transfer Protocol |
- Understand how a connection is initiated over thetransport layer - Identify the components of an HTTP URL - Explain the two types of HTTP messages: requestand response |
Introduction to the Visual Policy Manager |
- Describe the relationship among the VPM, CPL, andthe Management Console - Describe the default processing order for policylayers and rules - Describe triggers and actions that can be used inwriting policy |
Filtering Web Content |
- Describe the main concepts of web filtering - Describe the primary category databases - Describe the category types available to policy - Describe how Blue Coat WebFilter and WebPulsework together |
Using Threat Intelligence to Defend the Network |
- Understand Intelligence Services as provided bythe Global Intelligence Network - Understand Geolocation and Threat Risk Levels andhow they can be used in policy |
Ensuring Safe Downloads |
- Describe how malware can be transmitted viaHTTP - Explain the methods, advantages, anddisadvantages of file type detection - Describe some of the considerations in deciding what content to block as possible malware sources |
Notifying Users of Internet Usage Policies |
- Explain the function and various components ofbuilt-in and custom exception pages - Describe the function of Notify User objects - Identify the types of pages that can be sent tousers by using Notify User objects - Describe splash pages and coaching pages usingNotify User objectsin the VPM |
Access Logging on the ProxySG |
- Describe, at a high level, how the ProxySGperforms access logging - Describe the components of a ProxySG access logfacility - Identify default log facilities and log formats - Describe common use cases for periodic andcontinuous uploading of access logs |
ProxySG Initial Configuration |
- Access the ProxySG and perform initial configuration - Describe the two SGOS editions and various license types - Understand the optional capabilities available with SGOS |
Using Authentication Realms |
- Describe the benefits of enabling authentication onthe ProxySG - Describe, at a high level, the ProxySGauthentication architecture - Understand the use of IWA realms, with both IWADirect and IWA BCAAA connection methods |
Understanding Authentication Credentials |
- Describe how NTLM and Kerberos authenticationwork in both IWA direct and IWA BCAAA deployments - Configure the ProxySG to use Kerberosauthentication |
Understanding Authentication Modes |
- Describe authentication surrogates andauthentication modes - Describe ProxySG authentication in both explicitand transparent deployment mode |
Understanding HTTPS |
- Describe authentication surrogates andauthentication modes - Describe ProxySG authentication in both explicitand transparent deployment mode |
Managing SSL Traffic on the ProxySG |
- Describe how the SSL proxy service handles SSLtraffic - Describe the standard keyrings that are installed bydefault on the ProxySG - Identify the types of security certificates that theProxySG uses |
Optimizing SSL Interception Performance | - Configure the ProxySG to process SSL trafficaccording to best practices for performance |
SGOS Architecture |
- Identify key components of SGOS - Explain the interaction among client workers andsoftware workers in processing client requests - Explain the significance of policy checkpoints |
Caching Architecture |
- Describe the benefits of object caching on theProxySG. - Explain the caching-related steps in a ProxySGtransaction. - Identify and describe the HTTP request andresponse headers related to caching. |
System Diagnostics on the ProxySG |
- Describe the use of the health monitor and healthchecks - Explain the use of the event and access logs - Describe the information available in advanced URLs and sysinfo files - Describe the function of policy tracing and packetcaptures |
Introduction to CPL |
- Describe the fundamental concepts and purposesof ProxySG policy transactions - Understand the relationship of layers, rules,conditions, properties, and triggers - Describe the two types of actions in CPL |
Using Policy Tracing for Troubleshooting |
- Identify the two main types of ProxySG policytraces - Describe the various sections of a policy traceresult - Configure a global and policy-driven trace - Access and interpret policy trace results |
ProxySG Integration | - Identify other Symantec products that can be usedas part of a complete security solution |
Symantec ProxySG Secure Web Gateway - Diagnostics and Troubleshooting Overview |
- Provide an overview of the ProxySG Secure WebGateway Solution functions and components - Provide an overview of ways you can monitor CPUusage on the ProxySG - Provide an overview of ways you can monitormemory usage on the ProxySG - Provide an overview of ways you can monitorbandwidth usage on the ProxySG - Understand the relationship with external dependencies such as DNS and ICAP servers - Provide an overview of SSL interception issues onthe ProxySG |
Exploring Sysinfo Files |
- Understand the components of a sysinfo file - Understand the various sections of a sysinfo file |
Troubleshooting Issues Related to Authentication |
- Description of components, architecture, and process flow of authentication - Define issues related to authentication - Diagnose issues related to authentication - Solve issues related to authentication - Communicate results |
Troubleshooting Issues Related to DNS |
- Description of components, architecture, and process flow of authentication - Define issues related to authentication - Diagnose issues related to authentication - Solve issues related to authentication - Communicate results |
Troubleshooting SSL Interception Issues |
- Description of components, architecture, and process flow of authentication - Define issues related to authentication - Diagnose issues related to authentication - Solve issues related to authentication - Communicate results |
Troubleshooting Performance Issuesrelated to policy efficiency |
- Description of components, architecture, and process flow of authentication - Define issues related to authentication - Diagnose issues related to authentication - Solve issues related to authentication - Communicate results |
To ensure success in Broadcom ProxySG Technical certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for Symantec ProxySG Technical Specialist (250-556) exam.