Broadcom Web Security Service Technical (250-554) Certification Sample Questions

Broadcom 250-554 VCE, Web Security Service Technical Dumps, 250-554 PDF, 250-554 Dumps, Web Security Service Technical VCEGetting knowledge of the Broadcom 250-554 exam structure and question format is vital in preparing for the Symantec Web Security Service Technical Specialist certification exam. Our Broadcom Web Security Service Technical sample questions offer you information regarding the question types and level of difficulty you will face in the real exam. The benefit of using these Broadcom 250-554 sample questions is that you will get to check your preparation level or enhance your knowledge by learning the unknown questions. You will also get a clear idea of the exam environment and exam pattern you will face in the actual exam with the Symantec Web Security Service Technical Specialist Sample Practice Test. Therefore, solve the Broadcom Web Security Service Technical sample questions to stay one step forward in grabbing the Broadcom Symantec Web Security Service - R1.2 Technical Specialist credential.

These Broadcom 250-554 sample questions are simple and basic questions similar to the actual Broadcom Web Security Service Technical questions. If you want to evaluate your preparation level, we suggest taking our Symantec Web Security Service Technical Specialist Premium Practice Test. You might face difficulties while solving the real-exam-like questions. But, you can work hard and build your confidence on the syllabus topics through unlimited practice attempts.

Broadcom 250-554 Sample Questions:

01. What is significant about Group B rules when creating policies in the WSS Portal?
a)
Might depend on content returned from the web destination
b) Always block
c) Always allow
d) Have 6 permanently blocked categories

02. What are the different types of reports available for use by an administrator?
a)
Basic, Detailed
b) Simple, Custom, Pre-defined, Forensic
c) Custom, Pre-defined, Detailed, Forensic
d) Basic, Detailed, Pre-defined, Forensic

03. Why should an administrator utilize Universal Policy Enforcement?
a)
To manage policies on both on-premise ProxySG and SEP with WSS-SEP
b) To manage policies on both WSS and on-premise Data Loss Prevention
c) To manage policies on both WSS and on-premise ProxySG
d) To manage policies on both WSS and SD Cloud Connector

04. What does it mean when the WSS Agent goes into Passive Mode?
a)
WSS Agent user is unable to overwrite OS settings
b) WSS Agent does not send user traffic to WSS, and is egressing behind a defined location
c) WSS will apply all ProxySG policies to the traffic coming from WSS Agent
d) WSS has determined that there is NOT a location defined for the Egress IP that WSS receivestraffic from

05. What is important about the traffic between the firewall and WSS, with the Firewall/VPN/IPsec access method?
a)
Traffic between the Firewall and WSS goes through an encrypted VPN tunnel Incursion
b) Traffic between the Firewall and WSS is always inspected by SSLV
c) HTTPS traffic is insecure and HTTP traffic is secure
d) Only HTTPS traffic can be sent through a VPN Tunnel

06. When a user logs into a workstation that is not a member of a domain, will policy based upon Group membership ever apply to traffic from this user?
a)
Yes, if the user’s workstation has a network connection to the Internet.
b) Yes, if the Domain name services server is configured for the Cloud Service group policy.
c) Yes, if Captive Portal for WSSA is enabled and BCCA is configured.
d) No, the client needs to be attached to the Domain.

07. Which port is utilized for pulling the PAC file from WSS when using the Explicit Proxy Access Method?
a)
Port 443 is used to pull the PAC file from WSS.
b) Port 80 is used to pull the PAC file from WSS.
c) Port 8080 is used to pull the PAC file from WSS.
d) Either ports 8443 or port 8080 can be used to pull the PAC file from WSS.

08. What happens when a condition matches a Symantec WSS policy rule During Policy rule evaluations?
a)
Rule is executed, and any rule lower down on the list is reported on
b) If rule is from Group A, then it is logged only
c) If rule is from Group B, then it is executed after All Group B rules are evaluated
d) All subsequent rules are ignored (stop at first matching rule)

09. Which two applications are able to be utilized as an IdP when implementing SAML with WSS?
(Select two)
a) ADFS
b) ProxySG
c) Auth Connector
d) Captive Portal
e) Roaming Captive Portal

10. Where does the Firewall/VPN/IPsec access method connection receive its Data Center IP address from?
a)
proxy.threatpulse.net
b) client.threatpulse.net
c) ios.threatpulse.com
d) Manually entered during the firewall configuration setup

Answers:

Question: 01
Answer: a
Question: 02
Answer: b
Question: 03
Answer: c
Question: 04
Answer: b
Question: 05
Answer: a
Question: 06
Answer: c
Question: 07
Answer: a
Question: 08
Answer: d
Question: 09
Answer: a, c
Question: 10
Answer: d

Note: For any error in Symantec Web Security Service Technical Specialist (250-554) certification exam sample questions, please update us by writing an email on feedback@certfun.com.

Rating: 5 / 5 (72 votes)