VMware

Symantec Edge SWG R3 Technical Specialist

250-615

Prepare for the 250-615 exam to validate your skills in Symantec Edge SWG.

189 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 11–20 of 189

Q11

A company needs to allow only approved sites in Symantec Edge SWG. What should the administrator configure?

  • A Traffic Scanning
  • B URL Filtering
  • C Content Inspection
  • D Real-time Threat Protection
Explanation URL Filtering is specifically designed to control access to websites based on categories, while others focus on different areas of security.
Q12

You are configuring user authentication in Symantec Edge SWG. What happens when authentication fails?

  • A Access is granted automatically
  • B No access is allowed
  • C User is warned only
  • D VPN access is activated
Explanation Authentication failure results in denial of access for the user, ensuring security is maintained.
Q13

Which service in VMware Symantec Edge SWG provides real-time threat intelligence?

  • A Content Filtering
  • B Threat Intelligence Service
  • C Data Loss Prevention
  • D User Authentication
Explanation The Threat Intelligence Service aggregates global threat data, while the others serve different purposes.
Q14

A company needs to enforce secure access to cloud applications. What feature should they primarily use?

  • A Proxies
  • B Identity and Access Management
  • C Traffic Prioritization
  • D Content Filtering
Explanation Identity and Access Management allows secure access control, unlike other features that do not focus on access security.
Q15

What happens when a user attempts to access a blocked website through the VMware Symantec Edge SWG?

  • A Access is granted without restrictions
  • B User is redirected to a warning page
  • C Traffic is automatically encrypted
  • D User's IP address is permanently logged
Explanation Users receive a warning page explaining the block, whereas others will not occur in this scenario.
Q16

Which service allows for real-time data protection in Symantec SWG?

  • A Content Filtering
  • B Data Loss Prevention
  • C Threat Protection
  • D Web Filtering
Explanation Data Loss Prevention focuses on real-time data leakage prevention, while other services have different priorities.
Q17

You are configuring policy settings; what happens if two policies conflict?

  • A One policy overrides the other
  • B Both policies are executed
  • C Conflict causes a system error
  • D User can choose which applies
Explanation Conflicting policies typically result in one taking precedence, not executing both.
Q18

A company needs to implement SSL inspection; which option is essential?

  • A Secure Private Key
  • B User's Primary Email
  • C Local Firewall Rules
  • D Browser History
Explanation A secure private key is essential for SSL decryption during inspection, while the others are irrelevant to SSL setup.
Q19

Which service in Symantec Edge SWG enables URL filtering?

  • A Content Filter
  • B Threat Protection
  • C Bandwidth Management
  • D Access Control
Explanation Content Filter specifically manages URL filtering; others manage different functionalities.
Q20

A company needs to ensure secure web access for remote users via Symantec Edge SWG. What should be prioritized during configuration?

  • A High Availability
  • B User Authentication
  • C Content Caching
  • D Traffic Shaping
Explanation User Authentication is crucial for secure remote access; the others are supportive features.