VMware
Symantec Edge SWG R3 Technical Specialist
250-615
Prepare for the 250-615 exam to validate your skills in Symantec Edge SWG.
189 questions
0 views
Free
Questions 141–150 of 189
A company needs to ensure compliance with data protection regulations. Which feature of Symantec Edge SWG should they utilize?
-
A
Caching
-
B
Content Filtering
-
C
User Authentication
-
D
Data Loss Prevention
Explanation
Data Loss Prevention features help manage and secure sensitive data for compliance, unlike the others.
Which service does Symantec Edge SWG provide for web security?
-
A
URL filtering
-
B
DNS configuration
-
C
Email encryption
-
D
Virtual private networking
Explanation
URL filtering is the core function for web security, while the others are unrelated.
A company needs to control bandwidth usage per user. Which feature should be enabled?
-
A
Content filtering
-
B
Traffic shaping
-
C
URL blocking
-
D
Malware scanning
Explanation
Traffic shaping specifically manages bandwidth for users, unlike the others.
What happens when the certificate on a secure connection expires?
-
A
Instant connection drop
-
B
Warning message to users
-
C
Connection remains unaffected
-
D
All data encrypted
Explanation
Users will receive a warning about the expired certificate, while the connection may still happen but is insecure.
Which service is used to analyze web requests for malware in Symantec Edge SWG?
-
A
Web Security Service
-
B
DNS Filtering Service
-
C
Email Security Service
-
D
Content Filtering Service
Explanation
Web Security Service analyzes web requests for threats; others focus on different areas.
A company needs to restrict access to social media during work hours. Which configuration should they use?
-
A
URL filtering policies
-
B
Data Loss Prevention rules
-
C
VPN configurations
-
D
User identity settings
Explanation
URL filtering policies specifically control web access; the others serve different purposes.
What happens when you enable policy logging in Symantec Edge SWG?
-
A
Logs all user activity
-
B
Increases network latency
-
C
Disables all policies
-
D
Only critical alerts are logged
Explanation
Enabling policy logging logs all user activity, while others imply incorrect behavior.
Which service provides real-time threat detection in Symantec SWG?
-
A
Advanced Threat Protection
-
B
Web Filtering Service
-
C
Data Loss Prevention
-
D
Cloud Application Security
Explanation
Advanced Threat Protection is designed for real-time threat detection, while the others focus on different aspects of security.
A company needs to restrict access to social media sites during work hours. What should the administrator configure?
-
A
Content Filtering Settings
-
B
Firewall Policies
-
C
Proxy Settings
-
D
User Privileges
Explanation
Content Filtering Settings specifically address restricting access based on site categories, unlike other options.
You are configuring SSL VPN in Symantec Edge SWG. What happens when a user connects before SSL is established?
-
A
Access is immediately granted
-
B
User receives a connection error
-
C
Session is logged for review
-
D
Traffic is allowed but monitored
Explanation
A connection error occurs because the secure connection must be established first before granting access.