New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Symantec 250-440 Practice Exam with Questions & Answers | Set: 2

Questions 11

A PacketSHaper is installed between the VPN Gateway and Internet i outer at the main site of a company's network A server at the main site is hosting business critical applications. A local ion-based traffic tree has been created which classifies traffic coming from three remote sites by subnet. All traffic between the remote sites and the central sue is encrypted.

Which two (2) useful pieces of data can the PacketShaper provide in this scenario? (Select two)

Options:
A.

Bandwidth utilization of each individual application

B.

Bandwidth utilization of the total encrypted VPN traffic

C.

lop talkers and Top Listeners at the remote site

D.

Bandwidth utilization of each individual remote site

E.

Subnets or host lists of location-based classes

Symantec 250-440 Premium Access
Questions 12

How is a traffic How classified when it does NOT match any of the classes in the traffic tree?

Options:
A.

As Localhost

B.

As Default

C.

As Sameside traffic

D.

As HTTP unknown

Questions 13

Which two (2) tasks does response time measurement (RTM) allow an administrator to perform? (Select two)

Options:
A.

Measure the quality of users' network experience

B.

Examine host, performance and CPUstatistics

C.

Measure the quality of packet exchange times

D.

Measure the numberoftimestrafficflows match a class

E.

Examine performance statistics and performance graphs

Questions 14

Which statement accurately describes rate policies and priority policies?

Options:
A.

Priority policies are most appropriate tor interactive trafficthat is burstable

B.

Rate polices apply only to non-IP traffic

C.

Traffic classes without a specific policy assigned, are allocated no bandwidth

D.

Traffic withrate policies are applied before the priority policy

Questions 15

When would Symantec recommend backing up measurement data, using the measurement engine?

Options:
A.

Prior to a software upgrade

B.

Before returning the appliance to the manufacturer

C.

When verifying that a transfer is complete

D.

After performing a restore of the data from backups

Questions 16

A network administratoris interested in protecting VoIP traffic on the network.

How can the administrator best accomplish this while maintaining visibility into overall VoIP bandwidth utilization'

Options:
A.

An administrator is unable to monitor and protect All VoIP traffic at once using a PacketShaper

B.

Create a classbased on the IP addresses of the IP phones so that alltraffic between them can be measured and controlled

C.

Use PacketShaper’s Flow Detail Record (FDR) feature to have the PacketShaper export VoIP flow data to ReportCenter

D.

Create a folder with a guaranteed minimum sue partition and move all of the VoIP related classes into the folder

Questions 17

Which steps will produce the data required to create an application-specific matching rule?

Options:
A.

Use class criteria track to enable tracking on a specific class and then use class criteria recent to see a list of recent values for the class

B.

Use class criteria attributes to see attributes for a specific class and then use class criteria recent to see alist of recent values for the class

C.

Use class criteria trade toenable tracking on a specific class and to see a list of recent values for the class

D.

Use class criteria attributes to see attributes fora specific class and then use class criteria track to track the recent values for the class

Questions 18

Refer to the traffic tree in the exhibit.

250-440 Question 18

Which policy does the PacketShaper apply to London HTTP traffic?

Options:
A.

Priority (0)

B.

Priority (3)

C.

Rate (2) ok

D.

Priority (6)

Questions 19

What statement accurately describes an ignore policy?

Options:
A.

With an ignore policy, traffic is ignored but still counted as part of the link traffic under management

B.

It causes PackelShaper to treat specified flows as pass-through traffic

C.

With an ignore policy, the CU must be used to review RTM

D.

It traverses the traffic tree looking for a matching traffic class

Questions 20

Which statement accurately describes the PacketShaper measurement engine?

Options:
A.

It collects histogram data that can be backed up to the PacketShaper

B.

Its data is stored in tab-delimited lists

C.

It collects histogram data that can be exported to a die

D.

It Is a background process that collects traffic tree data

Exam Code: 250-440
Certification Provider: Symantec
Exam Name: Administration of Symantec PacketShaper 11.9.1
Last Update: Mar 27, 2025
Questions: 70