10/198 questions · Unlock full access
Q1

A financial services company is experiencing intermittent connectivity issues with a critical banking application that uses mutual TLS (mTLS) for client-server authentication. The issues began after deploying Edge SWG with full SSL interception. A policy trace reveals that the Edge SWG is attempting to intercept the traffic, causing the mTLS handshake to fail. Which configuration change is the most effective and secure method to resolve this issue?

Q2

A network administrator is configuring IWA direct authentication on an Edge SWG appliance. Despite correctly configuring the realm and joining the domain, users are still being prompted for credentials. A packet capture shows that client requests to the Edge SWG lack the necessary Kerberos ticket. Which of the following is the most likely cause of this issue?

Q3Multiple answers

An administrator needs to create a policy that isolates all web traffic destined for newly registered domains, as these are considered high-risk. Which TWO components are essential to build this policy in the Visual Policy Manager (VPM)? (Select TWO)

Q4

A multinational corporation uses Management Center to administer a fleet of Edge SWG appliances across different geographical regions. The security team needs to deploy a new, urgent VPM policy to block a zero-day threat, but only to the appliances in the European region. What is the most efficient method to achieve this in Management Center?

Q5

True or False: When Edge SWG is integrated with a Content Analysis appliance via ICAP, the Edge SWG is solely responsible for performing the actual malware scanning of files.

Q6

A hospital is deploying an Edge SWG in transparent mode to filter traffic for all devices on its network, including medical IoT devices that cannot be configured with explicit proxy settings. The primary goal is to prevent these devices from accessing known malicious command-and-control (C2) servers while allowing legitimate vendor update traffic. What is the most critical initial configuration step to ensure traffic is correctly intercepted?

Q7

During a security audit, it was discovered that the research department is using unsanctioned cloud storage applications. An administrator is tasked with creating a policy to block access to all 'Cloud Storage' category websites, EXCEPT for the company-approved application, 'corp-storage.com'. What is the best practice for structuring the rules in the VPM Web Access Layer to achieve this?

Q8

A system administrator is reviewing the health checks on an Edge SWG appliance and notices that the 'TCP-IP' health check is showing a 'critical' status. What does this status most likely indicate?

Q9

What is the primary function of the `sysinfo` file when troubleshooting an issue with an Edge SWG appliance?

Q10

A company wants to prevent employees from uploading sensitive documents to any website categorized as 'Personal Storage' or 'Social Networking'. Which Symantec Web Protection component and protocol are primarily used to inspect the content of these uploads for policy enforcement?