A company needs to allow only approved sites in Symantec Edge SWG. What should the administrator configure?
ATraffic Scanning
BURL Filtering
CContent Inspection
DReal-time Threat Protection
Explanation
URL Filtering is specifically designed to control access to websites based on categories, while others focus on different areas of security.
Q12
You are configuring user authentication in Symantec Edge SWG. What happens when authentication fails?
AAccess is granted automatically
BNo access is allowed
CUser is warned only
DVPN access is activated
Explanation
Authentication failure results in denial of access for the user, ensuring security is maintained.
Q13
Which service in VMware Symantec Edge SWG provides real-time threat intelligence?
AContent Filtering
BThreat Intelligence Service
CData Loss Prevention
DUser Authentication
Explanation
The Threat Intelligence Service aggregates global threat data, while the others serve different purposes.
Q14
A company needs to enforce secure access to cloud applications. What feature should they primarily use?
AProxies
BIdentity and Access Management
CTraffic Prioritization
DContent Filtering
Explanation
Identity and Access Management allows secure access control, unlike other features that do not focus on access security.
Q15
What happens when a user attempts to access a blocked website through the VMware Symantec Edge SWG?
AAccess is granted without restrictions
BUser is redirected to a warning page
CTraffic is automatically encrypted
DUser's IP address is permanently logged
Explanation
Users receive a warning page explaining the block, whereas others will not occur in this scenario.
Q16
Which service allows for real-time data protection in Symantec SWG?
AContent Filtering
BData Loss Prevention
CThreat Protection
DWeb Filtering
Explanation
Data Loss Prevention focuses on real-time data leakage prevention, while other services have different priorities.
Q17
You are configuring policy settings; what happens if two policies conflict?
AOne policy overrides the other
BBoth policies are executed
CConflict causes a system error
DUser can choose which applies
Explanation
Conflicting policies typically result in one taking precedence, not executing both.
Q18
A company needs to implement SSL inspection; which option is essential?
ASecure Private Key
BUser's Primary Email
CLocal Firewall Rules
DBrowser History
Explanation
A secure private key is essential for SSL decryption during inspection, while the others are irrelevant to SSL setup.
Q19
Which service in Symantec Edge SWG enables URL filtering?