VMware

Symantec Web Protection Cloud SWG R2 Technical Specialist

250-588

Validate your skills in web protection with the 250-588 exam.

200 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 131–140 of 200

Q131

A company needs to prevent users from accessing malicious websites. What should they configure in Symantec SWG?

  • A DLP Policies
  • B Web filtering rules
  • C Two-factor authentication
  • D VPN access
Explanation Web filtering rules directly address access control to harmful sites, while the other options serve different functions.
Q132

What happens when a user tries to access a blocked site through the Symantec SWG?

  • A Redirect to a warning page
  • B Complete access is granted
  • C The request fails silently
  • D Traffic is logged without intervention
Explanation The SWG redirects to a warning page, while other options do not align with the SWG's access blocking behavior.
Q133

Which service provides URL filtering in SWG?

  • A Web Proxy Service
  • B Content Filtering Service
  • C Email Security Service
  • D Firewall Service
Explanation Content Filtering Service controls web traffic and URLs, while others serve different functions.
Q134

A company needs to restrict access to specific social media sites. What should they configure?

  • A Proxy Settings
  • B VPN Services
  • C URL Policies
  • D Local Firewall
Explanation URL Policies enable precise control over blocked sites, unlike the other options.
Q135

What happens when a user accesses a blocked site through SWG?

  • A Access is granted immediately
  • B User is redirected to a block page
  • C Connection is silently dropped
  • D Access logs are cleared
Explanation A blocked site redirects to a block page, enhancing user awareness and compliance, while others do not reflect expected behavior.
Q136

Which service is primarily used for real-time threat intelligence in Symantec Web Protection Cloud?

  • A LiveUpdates
  • B Global Intelligence Network
  • C Endpoint Protection
  • D Email Security Service
Explanation Global Intelligence Network provides real-time threat data; others do not focus on real-time threat intelligence.
Q137

A company needs to restrict access to social media during work hours. Which feature should they implement?

  • A SSL Inspection
  • B Content Filtering
  • C Bandwidth Control
  • D User Authentication
Explanation Content Filtering directly restricts access to specified websites; others do not provide this functionality.
Q138

You are configuring a policy that allows only certain file types to be downloaded. What happens if an unsupported file type is requested?

  • A Download command is ignored
  • B Download is blocked
  • C Request is logged and notified
  • D File is downloaded in quarantine
Explanation Unsupported file types will be blocked based on the policy; others suggest incorrect handling of unauthorized files.
Q139

Which service does Symantec Web Protection Cloud primarily enhance?

  • A Web security and filtering
  • B Email encryption
  • C Data backup solutions
  • D Virtual machine monitoring
Explanation Web security and filtering is the primary function, while others are unrelated.
Q140

A company needs to ensure users are protected against phishing attacks. How should they configure Symantec Web Protection Cloud?

  • A Enable DNS protection only
  • B Activate URL filtering policies
  • C Set up VPN connections
  • D Disable SSL inspection
Explanation Activating URL filtering policies prevents access to phishing sites; other options do not directly target phishing.