Use this quick start guide to collect all the information about Broadcom Web Protection - Edge SWG Technical (250-581) Certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the 250-581 Symantec Web Protection - Edge SWG Technical Specialist exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual Broadcom Web Protection - Edge SWG Technical certification exam.
The Broadcom Web Protection - Edge SWG Technical certification is mainly targeted to those candidates who want to build their career in Network Security domain. The Broadcom Symantec Web Protection - Edge SWG R1 Technical Specialist exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of Broadcom Web Protection - Edge SWG Technical.
Broadcom Web Protection - Edge SWG Technical Exam Summary:
Exam Name | Broadcom Symantec Web Protection - Edge SWG R1 Technical Specialist |
Exam Code | 250-581 |
Exam Price | $250 (USD) |
Duration | 90 mins |
Number of Questions | 75 |
Passing Score | 70% |
Books / Training |
Symantec Web Protection - Edge SWG Planning, Implementation, and Administration R1 Symantec Web Protection - Edge SWG Diagnostics and Troubleshooting R1 |
Schedule Exam | Pearson VUE |
Sample Questions | Broadcom Web Protection - Edge SWG Technical Sample Questions |
Practice Exam | Broadcom 250-581 Certification Practice Exam |
Broadcom 250-581 Exam Syllabus Topics:
Topic | Details |
---|---|
Introduction to Symantec Edge SWG |
- What do proxy services provide? - What is SGOS? - What are the physical deployment options for the ProxySG? - What are the client connection options? |
Intercepting traffic and applying policy |
- How does policy evaluation work with multiple policy layers? - Why is the Detect Protocol attribute important? - What is the function of Content Programming Language? - What do the various components of a policy rule specify? |
Applying security and web usage policy to encrypted traffic |
- What does the SSL proxy service do? - What is the role of a keyring? - What role or roles does the ProxySG perform during transactions between clients and internet servers? - What policy layer is commonly used to control decrypting of HTTPS traffic? |
Providing security and web usage policies based on role or group |
- What function does an authentication realm perform? - Why is BCAAA sometimes required? - What does the authentication mode specify? - What is one reason to avoid using Basic credentials during authentication? |
Enforcing corporate guidelines for acceptable Internet browsing behavior |
- What benefit does dynamic categorization provide? - What do the categorization results “None” and “Pending” mean? - What functions do exception pages, notification pages, and coaching pages perform? - Why would an enterprise employ an acceptable use policy? |
Protecting the endpoint from malicious activity |
- What benefits do the Global Intelligence Network provide? - What benefit is provided by Client IP Reputation? - How are threat risk levels used in policy? - What protections can be provided when downloading files? |
Centrally managing devices with Management Center |
- How can policy be coordinated between on-premise and cloud SWG deployments? - What is the benefit of using role-based access in Management Center? - What is the role of scripts when configuring devices through Management Center? - What are some of the benefits of managing devices through Management Center? |
Reporting for Edge SWG features |
- What are some of the benefits of using Reporter with Management Center? - What configurations are needed for the ProxySG to send its access logs to Reporter? - What function do databases perform in Reporter? - What function do log sources perform in Reporter? |
Enhancing security with virus scanning |
- Over what protocol do the ProxySG and Content Analysis communicate? - What methods are useful in improving performance during virus scanning? - What can be done to improve the user experience during scanning? |
Using malware analysis to analyze potentially malicious files |
- What are the two detection methods used in malware analysis? - What role do profiles play in malware analysis? - What role do patterns play in malware analysis? |
Providing security for risky and unknown for risky and unknown websites with HRI |
- How does isolation provide security to end users? - What is returned to the end user by the High Risk Isolation feature? - What anti-phishing protections are available with the full Web Isolation application? - How are websites assessed by the GIN for threat potential? |
Monitoring Edge SWG features |
- What information is available in the Dashboard section of the Management Center console? - What built-in reports are available in Management Center? - What information is provided by health checks in Management Center? - What are the various reports available in Content Analysis? |
Understanding SGOS architecture and caching on the ProxySG |
- How does SGOS differ from operating systems? - How do policy checkpoints work? - How does object caching work on the ProxySG? - What are some of the caching techniques used by the ProxySG to optimize performance? |
Using built-in diagnostic tools on the ProxySG |
- What is the key value of running policy traces? - How can sysinfo files be useful? - What is one way to analyze network traffic? - What kind of information might be required by Symantec Support when troubleshooting issues? |
Expanding security with cloud integrations |
- How does Cloud SWG integrate with Office 365? - What does Universal Policy Enforcement do? - What security role does CloudSOC Audit perform? - How is SpanVA used? |
Edge SWG diagnostics and troubleshooting overview |
- Symantec troubleshooting methodology - Symantec Edge SWG component review - Key diagnostic tools review |
Diagnosing common issues on the Edge SWG |
- Diagnosing CPU usage issues - Diagnosing memory usage issues - Diagnosing issues with external dependencies |
Troubleshooting authentication issues on the Edge SWG |
- Overview of authentication on the Edge SWG - Defining issues related to authentication - Diagnosing issues related to authentication - Solving issues related to authentication - Result-Communicating result or contacting Symantec support |
Troubleshooting encrypted traffic management issues on the Edge SWG |
- Review of SSL interception on the Edge SWG - Defining issues related to SSL interception - Diagnosing issues related to SSL interception - Solving issues related to SSL interception - Result-Communicating result or contacting Symantec support |
Troubleshooting DNS issues on the Edge SWG |
- Overview of DNS service on the Edge SWG - Defining issues related to DNS lookups - Diagnosing issues related to DNS lookups - Solving issues related to DNS lookups - Result-Communicating result or contacting Symantec support |
Troubleshooting DNS issues on the Edge SWG |
- Review of policy operation on the Edge SWG - Defining policy issues on the Edge SWG - Diagnosing policy issues on the Edge SWG - Solving policy issues on the Edge SWG - Result-Communicating result or contacting Symantec support |
To ensure success in Broadcom Web Protection - Edge SWG Technical certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for Symantec Web Protection - Edge SWG Technical Specialist (250-581) exam.