Use this quick start guide to collect all the information about Broadcom Web Protection Technical (250-584) Certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the 250-584 Symantec Web Protection Technical Specialist exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual Broadcom Web Protection Technical certification exam.
The Broadcom Web Protection Technical certification is mainly targeted to those candidates who want to build their career in Network Security domain. The Broadcom Symantec Web Protection R1 Technical Specialist exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of Broadcom Web Protection Technical.
Broadcom Web Protection Technical Exam Summary:
Exam Name | Broadcom Symantec Web Protection R1 Technical Specialist |
Exam Code | 250-584 |
Exam Price | $250 (USD) |
Duration | 180 mins |
Number of Questions | 150 |
Passing Score | 70% |
Books / Training |
Web Protection - Edge SWG Planning, Implementation, and Administration R1 Web Protection - Edge SWG Diagnostics and Troubleshooting R1 Web Protection - Cloud SWG Planning, Implementation, and Administration R1 Web Protection - Cloud SWG Diagnostics and Troubleshooting R1 |
Schedule Exam | Broadcom |
Sample Questions | Broadcom Web Protection Technical Sample Questions |
Practice Exam | Broadcom 250-584 Certification Practice Exam |
Broadcom 250-584 Exam Syllabus Topics:
Topic | Details |
---|---|
Edge SWG Planning, Implementation, and Administration Course |
|
Intercepting traffic and applying policy |
- How does policy evaluation work with multiple policy layers? - Why is the Detect Protocol attribute important? - What is the function of Content Programming Language? - What do the various components of a policy rule specify? |
Introduction to Symantec Edge SWG |
- What do proxy services provide? - What is SGOS? - What are the physical deployment options for the ProxySG? - What are the client connection options? |
Applying security and web usage policy to encrypted traffic |
- What does the SSL proxy service do? - What is the role of a keyring? - What role or roles does the ProxySG perform during transactions between clients and internet servers? - What policy layer is commonly used to control decrypting of HTTPS traffic? |
Providing security and web usage policies based on role or group |
- What function does an authentication realm perform? - Why is BCAAA sometimes required? - What does the authentication mode specify? - What is one reason to avoid using Basic credentials during authentication? |
Enforcing corporate guidelines for acceptable Internet browsing behavior |
- What benefit does dynamic categorization provide? - What do the categorization results “None” and “Pending” mean? - What functions do exception pages, notification pages, and coaching pages perform? - Why would an enterprise employ an acceptable use policy? |
Protecting the endpoint from malicious activity |
- What benefits do the Global Intelligence Network provide? - What benefit is provided by Client IP Reputation? - How are threat risk levels used in policy? - What protections can be provided when downloading files? |
Centrally managing devices with Management Center |
- How can policy be coordinated between on-premise and cloud SWG deployments? - What is the benefit of using role-based access in Management Center? - What is the role of scripts when configuring devices through Management Center? - What are some of the benefits of managing devices through Management Center? |
Reporting for Edge SWG features |
- What are some of the benefits of using Reporter with Management Center? - What configurations are needed for the ProxySG to send its access logs to Reporter? - What function do databases perform in Reporter? - What function do log sources perform in Reporter? |
Enhancing security with virus scanning |
- Over what protocol do the ProxySG and Content Analysis communicate? - What methods are useful in improving performance during virus scanning? - What can be done to improve the user experience during scanning? |
Using malware analysis to analyze potentially malicious files |
- What are the two detection methods used in malware analysis? - What role do profiles play in malware analysis? - What role do patterns play in malware analysis? |
Providing security for risky and unknown for risky and unknown websites with HRI |
- How does isolation provide security to end users? - What is returned to the end user by the High Risk Isolation feature? - What anti-phishing protections are available with the full Web Isolation application? - How are websites assessed by the GIN for threat potential? |
Monitoring Edge SWG features |
- What information is available in the Dashboard section of the Management Center console? - What built-in reports are available in Management Center? - What information is provided by health checks in Management Center? - What are the various reports available in Content Analysis? |
Understanding SGOS architecture and caching on the ProxySG |
- How does SGOS differ from operating systems? - How do policy checkpoints work? - How does object caching work on the ProxySG? - What are some of the caching techniques used by the ProxySG to optimize performance? |
Using built-in diagnostic tools on the ProxySG |
- What is the key value of running policy traces? - How can sysinfo files be useful? - What is one way to analyze network traffic? - What kind of information might be required by Symantec Support when troubleshooting issues? |
Expanding security with cloud integrations |
- How does Cloud SWG integrate with Office 365? - What does Universal Policy Enforcement do? - What security role does CloudSOC Audit perform? - How is SpanVA used? |
Edge SWG Diagnostics and Troubleshooting Course |
|
Edge SWG diagnostics and troubleshooting overview |
- Symantec troubleshooting methodology - Symantec Edge SWG component review - Key diagnostic tools review |
Expanding security with cloud integrations |
- How does Cloud SWG integrate with Office 365? - What does Universal Policy Enforcement do? - What security role does CloudSOC Audit perform? - How is SpanVA used? |
Diagnosing common issues on the Edge SWG |
- Diagnosing CPU usage issues - Diagnosing memory usage issues - Diagnosing issues with external dependencies |
Troubleshooting authentication issues on the Edge SWG |
- Overview of authentication on the Edge SWG - Defining issues related to authentication - Diagnosing issues related to authentication - Solving issues related to authentication - Result-Communicating result or contacting Symantec support |
Troubleshooting encrypted traffic management issues on the Edge SWG |
- Review of SSL interception on the Edge SWG - Defining issues related to SSL interception - Diagnosing issues related to SSL interception - Solving issues related to SSL interception - Result-Communicating result or contacting Symantec support |
Troubleshooting DNS issues on the Edge SWG |
- Overview of DNS service on the Edge SWG - Defining issues related to DNS lookups - Diagnosing issues related to DNS lookups - Solving issues related to DNS lookups - Result-Communicating result or contacting Symantec support |
Troubleshooting DNS issues on the Edge SWG |
- Review of policy operation on the Edge SWG - Defining policy issues on the Edge SWG - Diagnosing policy issues on the Edge SWG - Solving policy issues on the Edge SWG - Result-Communicating result or contacting Symantec support |
Cloud SWG Planning, Implementation, and Administration & Diagnostics and Troubleshooting Courses |
|
EXAM SECTION 200: Cloud Secure Web Gateway General Administration | - Understand Cloud Secure Web Gateway (Cloud SWG) General Administration. |
EXAM SECTION 300: Cloud Secure Web Gateway Architecture and Infrastructure | - Understand Cloud Secure Web Gateway (Cloud SWG) Architecture and Infrastructure. |
EXAM SECTION 400: Cloud Secure Web Gateway Access Methods |
- Understand Cloud Secure Web Gateway (Cloud SWG) Access Methods. - Understand Cloud Secure Web Gateway (Cloud SWG) Firewall/VPN Access Method - Understand Cloud Secure Web Gateway (Cloud SWG) WSS Agent Access Method - Understand Cloud Secure Web Gateway (Cloud SWG) Explicit Proxy Access Method - Understand Cloud Secure Web Gateway (Cloud SWG) SEP Integration Access Method - Understand Cloud Secure Web Gateway (Cloud SWG) Proxy Forwarding Access Method - Understand Cloud Secure Web Gateway (Cloud SWG) Mobile Device Access Method |
EXAM SECTION 500: Cloud Secure Web Gateway Authentication |
- Understand Cloud Secure Web Gateway (Cloud SWG) Authentication. - Understand Cloud Secure Web Gateway (Cloud SWG) Auth Connector - Understand Cloud Secure Web Gateway (Cloud SWG) SAML Implementation - Understand Cloud Secure Web Gateway (Cloud SWG) Captive Portal - Understand Cloud Secure Web Gateway (Cloud SWG) Roaming Captive Portal |
EXAM SECTION 600: Cloud Secure Web Gateway Policy, Threat Protection, Malware Analysis and using Secure Sockets Layer (SSL) |
- Understand Cloud Secure Web Gateway (Cloud SWG) Policy, Threat Protection, Malware Analysis and using Secure Sockets Layer (SSL) - Understand Cloud Secure Web Gateway (Cloud SWG) Policy - Understand Cloud Secure Web Gateway (Cloud SWG) Threat Protection - Understand Cloud Secure Web Gateway (Cloud SWG) Malware Analysis - Understand Cloud Secure Web Gateway (Cloud SWG) Using Secure Sockets Layer (SSL) |
EXAM SECTION 700: Cloud Secure Web Gateway Reports including Forensic Reports |
- Understand Cloud Secure Web Gateway (Cloud SWG) Reports - Understand Cloud Secure Web Gateway (Cloud SWG) Forensic Reports |
EXAM SECTION 800: Integration of Cloud SWG with Data Loss Prevention (DLP), Cloud Access Security Broker (CASB), CloudSOC and Web Isolation |
- Understand the integration of Cloud Secure Web Gateway (Cloud SWG) with Data Loss Prevention (DLP) - Understand the integration of Cloud Secure Web Gateway (Cloud SWG) with Cloud Access Security Broker (CASB) CloudSOC - Understand the integration of Cloud Secure Web Gateway (Cloud SWG) with Web Isolation |
To ensure success in Broadcom Web Protection Technical certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for Symantec Web Protection Technical Specialist (250-584) exam.