Symantec Related Exams
250-556 Exam

When will a policy trace report a rule processing result of “N/A”? (Choose the best answer.)
What must the virtual URL point to, when the ProxySG utilizes a virtual URL for user authentication in a transparent deployment? (Choose the best answer.)
In which caching technique are objects that require more server-side bandwidth and response time less likely to be deleted from the cache? (Choose the best answer.)