Broadcom ProxySG Technical Exam Syllabus

ProxySG Technical PDF, 250-556 Dumps, 250-556 PDF, ProxySG Technical VCE, 250-556 Questions PDF, Broadcom 250-556 VCEUse this quick start guide to collect all the information about Broadcom ProxySG Technical (250-556) Certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the 250-556 Symantec ProxySG Technical Specialist exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual Broadcom ProxySG Technical certification exam.

The Broadcom ProxySG Technical certification is mainly targeted to those candidates who want to build their career in Network Security domain. The Broadcom Symantec ProxySG 6.7 Technical Specialist exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of Broadcom ProxySG Technical.

Broadcom ProxySG Technical Exam Summary:

Exam Name Broadcom Symantec ProxySG 6.7 Technical Specialist
Exam Code 250-556
Exam Price $250 (USD)
Duration 90 mins
Number of Questions 65-75
Passing Score 70%
Books / Training ProxySG 6.7 Basic Administration
ProxySG 6.7 Advanced Administration
ProxySG 6.7 Diagnostics and Troubleshooting
Schedule Exam Pearson VUE
Sample Questions Broadcom ProxySG Technical Sample Questions
Practice Exam Broadcom 250-556 Certification Practice Exam

Broadcom 250-556 Exam Syllabus Topics:

Topic Details
Introduction to the Symantec ProxySG Secure Web Gateway - Describe the functions of a proxy server
- Differentiate proxy serversfrom firewalls
- Describe the key features and benefits of the Symantec ProxySG
- List the various ProxySG models
- Access online Symantec community resources
ProxySG Security Deployment Options - Describe the three network deployment options
- Describe the three possible roles of the ProxySG
ProxySG Management Console - Describe the relationship between the Management Console and the ProxySG CLI
- Describe the primary function of the major areas ofthe Management Console
- Use the Management Console to access on-boxhelp and Symantec product documentation
Traffic Interception using Proxy Services - Understand the functions of proxy services,listeners, and proxy types
- Describe the three most common proxy services
- Explain how the intercept and bypass settings affect what happens to network traffic passingthrough the ProxySG
Hypertext Transfer Protocol - Understand how a connection is initiated over thetransport layer
- Identify the components of an HTTP URL
- Explain the two types of HTTP messages: requestand response
Introduction to the Visual Policy Manager - Describe the relationship among the VPM, CPL, andthe Management Console
- Describe the default processing order for policylayers and rules
- Describe triggers and actions that can be used inwriting policy
Filtering Web Content - Describe the main concepts of web filtering
- Describe the primary category databases
- Describe the category types available to policy
- Describe how Blue Coat WebFilter and WebPulsework together
Using Threat Intelligence to Defend the Network - Understand Intelligence Services as provided bythe Global Intelligence Network
- Understand Geolocation and Threat Risk Levels andhow they can be used in policy
Ensuring Safe Downloads - Describe how malware can be transmitted viaHTTP
- Explain the methods, advantages, anddisadvantages of file type detection
- Describe some of the considerations in deciding what content to block as possible malware sources
Notifying Users of Internet Usage Policies - Explain the function and various components ofbuilt-in and custom exception pages
- Describe the function of Notify User objects
- Identify the types of pages that can be sent tousers by using Notify User objects
- Describe splash pages and coaching pages usingNotify User objectsin the VPM
Access Logging on the ProxySG - Describe, at a high level, how the ProxySGperforms access logging
- Describe the components of a ProxySG access logfacility
- Identify default log facilities and log formats
- Describe common use cases for periodic andcontinuous uploading of access logs
ProxySG Initial Configuration - Access the ProxySG and perform initial configuration
- Describe the two SGOS editions and various license types
- Understand the optional capabilities available with SGOS
Using Authentication Realms - Describe the benefits of enabling authentication onthe ProxySG
- Describe, at a high level, the ProxySGauthentication architecture
- Understand the use of IWA realms, with both IWADirect and IWA BCAAA connection methods
Understanding Authentication Credentials - Describe how NTLM and Kerberos authenticationwork in both IWA direct and IWA BCAAA deployments
- Configure the ProxySG to use Kerberosauthentication
Understanding Authentication Modes - Describe authentication surrogates andauthentication modes
- Describe ProxySG authentication in both explicitand transparent deployment mode
Understanding HTTPS - Describe authentication surrogates andauthentication modes
- Describe ProxySG authentication in both explicitand transparent deployment mode
Managing SSL Traffic on the ProxySG - Describe how the SSL proxy service handles SSLtraffic
- Describe the standard keyrings that are installed bydefault on the ProxySG
- Identify the types of security certificates that theProxySG uses
Optimizing SSL Interception Performance - Configure the ProxySG to process SSL trafficaccording to best practices for performance
SGOS Architecture - Identify key components of SGOS
- Explain the interaction among client workers andsoftware workers in processing client requests
- Explain the significance of policy checkpoints
Caching Architecture - Describe the benefits of object caching on theProxySG.
- Explain the caching-related steps in a ProxySGtransaction.
- Identify and describe the HTTP request andresponse headers related to caching.
System Diagnostics on the ProxySG - Describe the use of the health monitor and healthchecks
- Explain the use of the event and access logs
- Describe the information available in advanced URLs and sysinfo files
- Describe the function of policy tracing and packetcaptures
Introduction to CPL - Describe the fundamental concepts and purposesof ProxySG policy transactions
- Understand the relationship of layers, rules,conditions, properties, and triggers
- Describe the two types of actions in CPL
Using Policy Tracing for Troubleshooting - Identify the two main types of ProxySG policytraces
- Describe the various sections of a policy traceresult
- Configure a global and policy-driven trace
- Access and interpret policy trace results
ProxySG Integration - Identify other Symantec products that can be usedas part of a complete security solution
Symantec ProxySG Secure Web Gateway - Diagnostics and Troubleshooting Overview - Provide an overview of the ProxySG Secure WebGateway Solution functions and components
- Provide an overview of ways you can monitor CPUusage on the ProxySG
- Provide an overview of ways you can monitormemory usage on the ProxySG
- Provide an overview of ways you can monitorbandwidth usage on the ProxySG
- Understand the relationship with external dependencies such as DNS and ICAP servers
- Provide an overview of SSL interception issues onthe ProxySG
Exploring Sysinfo Files - Understand the components of a sysinfo file
- Understand the various sections of a sysinfo file
Troubleshooting Issues Related to Authentication - Description of components, architecture, and process flow of authentication
- Define issues related to authentication
- Diagnose issues related to authentication
- Solve issues related to authentication
- Communicate results
Troubleshooting Issues Related to DNS - Description of components, architecture, and process flow of authentication
- Define issues related to authentication
- Diagnose issues related to authentication
- Solve issues related to authentication
- Communicate results
Troubleshooting SSL Interception Issues - Description of components, architecture, and process flow of authentication
- Define issues related to authentication
- Diagnose issues related to authentication
- Solve issues related to authentication
- Communicate results
Troubleshooting Performance Issuesrelated to policy efficiency - Description of components, architecture, and process flow of authentication
- Define issues related to authentication
- Diagnose issues related to authentication
- Solve issues related to authentication
- Communicate results

To ensure success in Broadcom ProxySG Technical certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for Symantec ProxySG Technical Specialist (250-556) exam.

Rating: 5 / 5 (81 votes)