Symantec ZTNA Complete R1 Technical Specialist 온라인 연습
최종 업데이트 시간: 2026년04월22일
당신은 온라인 연습 문제를 통해 Broadcom 250-583 시험지식에 대해 자신이 어떻게 알고 있는지 파악한 후 시험 참가 신청 여부를 결정할 수 있다.
시험을 100% 합격하고 시험 준비 시간을 35% 절약하기를 바라며 250-583 덤프 (최신 실제 시험 문제)를 사용 선택하여 현재 최신 110개의 시험 문제와 답을 포함하십시오.
/ 8
Question No : 1
Analyst logs in for the first time.
Based on best practices for local ZTNA administrative accounts, what system behavior occurs during step 4?
정답:
Question No : 2
An IT Security Manager is relying on the ZTNA Dashboard's "Site Connector Health" widget to monitor the global infrastructure during a critical holiday shopping period. The widget relies on the continuous outbound TCP 443 heartbeat from the connectors. (Choose 2.)
Dashboard Widget State:
Site_Tokyo_01: Online (Green)
Site_London_01: Degraded (Yellow)
Site_NY_01: Offline (Red)
Which TWO statements accurately interpret the operational realities and limitations represented by these specific dashboard health states?
정답:
Question No : 3
A Zero Trust Implementation Specialist is deploying the Symantec ZTNA endpoint agent to a fleet of newly provisioned corporate laptops. The organization's security policy dictates that devices must be securely routed and their compliance posture continuously verified from the moment the operating system boots, without requiring any manual intervention from the end-user.
Which agent configuration mode must the specialist select to fulfill this strict security mandate?
정답:
Question No : 4
An Enterprise Security Administrator is configuring a tiered access policy in the ZTNA Admin Portal. The goal is to balance user friction with security by applying different contextual authorization requirements based on the sensitivity of the requested resource.
ZTNA Policy Tier Configuration:
Tier 1 (Low Sensitivity): Employee Cafeteria Menu (Web)
- Identity: SAML SSO (No MFA required)
- Posture: Basic (OS version check only)
Tier 2 (Medium Sensitivity): Internal Ticketing System (Web)
- Identity: SAML SSO + MFA
- Posture: Standard (OS version + AV running)
Tier 3 (High Sensitivity): Source Code Repository (SSH)
- Identity: SAML SSO + MFA
- Posture: Strict (OS version + AV + Client Certificate + No split-tunneling)
Which THREE statements accurately reflect how continuous contextual authorization processes these tiered requirements? (Select all that apply.)
정답:
Question No : 5
A Security Compliance Analyst is conducting an audit of the Tenant Admin accounts within the Symantec ZTNA environment. The analyst is looking for configurations that violate the organization's identity security policies. (Choose 2.)
Which TWO administrative configurations represent dangerous anti-patterns regarding the management and authentication of ZTNA admin accounts?
정답:
Question No : 6
A Cloud Security Engineer is auditing the configuration of an internal developer portal. The engineer discovers that an attempt to apply a path-based policy exception has completely failed, allowing unauthorized users to access a restricted directory. (Choose 2.)
Application Configuration Review:
App Name: Dev_Portal_TCP
App Type: TCP Tunnel (Agent-Based)
Target Host: 10.0.5.50
Port: 443
Failed Policy Exception:
Rule: Block_Dev_Secrets
App: Dev_Portal_TCP
Path Constraint: /secrets/api_keys/*
Action: Block
Group: Junior_Devs
Which TWO statements describe the architectural anti-pattern that caused this path-based exception to fail?
정답:
Question No : 7
Maintain continuous visibility in the ZTNA Admin Portal.
Which THREE architectural principles apply when meeting these deployment requirements using the VMware OVA? (Select all that apply.)
정답:
Question No : 8
A Zero Trust Security Architect is reviewing the interaction between Identity Provider (IdP) timeouts and Continuous Contextual Authorization.
Configuration State:
IdP (Okta) Session Timeout: 8 Hours
ZTNA Global Absolute Timeout: 12 Hours
App 'Payroll' Posture: Strict_Corporate (Continuous AV Check)
A user authenticates at 08:00. At 14:00 (6 hours later), a malicious script disables the user's Antivirus. (Choose 2.)
Which TWO statements accurately describe how the ZTNA architecture handles this event, despite the user's Okta session still being technically valid for another 2 hours?
정답:
Question No : 9
A ZTNA Administrator is tasked with enabling Cloud SWG integration for a specific group of roaming users. The administrator has the PAC file URL hosted on a highly available internal server: https://pac.corp.local/roaming.pac .
Configuration Task:
Goal: Steer public web traffic to Cloud SWG for roaming users.
Tool: ZTNA Admin Portal.
Requirement: Agent must pull the PAC file dynamically.
Where in the ZTNA Admin Portal architecture must the administrator apply this PAC file URL to fulfill the requirement?
정답:
Question No : 10
A Zero Trust Security Architect is evaluating whether to use agentless browser-based access or agent-based (TCP Tunnel) access for a new vendor portal. The vendors use unmanaged, personal computers.
Vendor Access Scenario:
Environment: Unmanaged BYOD Hardware
Application Type: Internal Web Portal (HTTPS)
Requirement 1: Prevent vendors from downloading sensitive architectural diagrams to their local machines.
Requirement 2: Eliminate the need for vendors to install administrative-level software.
Which THREE statements represent the architectural trade-offs that make the agentless (Chrome extension) model the superior choice for this specific scenario? (Select all that apply.)
정답:
Question No : 11
A ZTNA Administrator is integrating the TIS Intelligence Feed to protect several custom domains configured for agentless access.
How is the TIS blocking mechanism typically applied within the Symantec ZTNA architecture to achieve this protection?
정답:
Question No : 12
A Cloud Security Engineer receives an escalation: a group of contractors cannot access a newly provisioned internal inventory web application. The engineer needs to verify if the application is correctly mapped to an active Site Connector and if an access rule is inadvertently blocking the contractor group.
Which TWO sections of the Admin Console must the engineer navigate to in order to verify these specific configurations? (Choose 2.)
정답:
Question No : 13
An Enterprise Security Administrator is automating the lifecycle of ZTNA Tenant Admins and end-users using Azure AD SCIM provisioning. The administrator maps specific Azure AD groups to different ZTNA functions.
SCIM Group Mapping Configuration:
Azure AD Group A: ZTNA_App_Users -> Mapped to ZTNA Access Policy (CRM App)
Azure AD Group B: ZTNA_Site_Admins -> Mapped to ZTNA Site Admin Role (Scope: EU Sites)
Status: SCIM is actively pushing these groups to the ZTNA platform.
Which THREE statements accurately describe how the ZTNA platform utilizes this SCIM-provisioned data across its different architectural components? (Select all that apply.)
정답:
Question No : 14
A Zero Trust Implementation Specialist is observing a junior administrator attempt to troubleshoot an offline Site Connector. The junior admin spends 20 minutes clicking through the "Policies" and "Identity" tabs searching for the connector's registration key and health status.
Audit Log Snippet:
14:02:11 - Admin: junior.admin - View: Identity_Providers
14:05:33 - Admin: junior.admin - View: Access_Policies
14:15:40 - Admin: junior.admin - View: Identity_Tenant_Admins
Which TWO statements explain why the junior administrator's navigation strategy is fundamentally flawed? (Choose 2.)
정답:
Question No : 15
A Security Operations Engineer is auditing the effectiveness of the TIS integration across a globally distributed ZTNA deployment. The engineer pulls a report from the ZTNA Admin Portal's logging interface to verify that TIS is actively enforcing policies across all applications. (Choose 2.)
Access Log Export Snippet:
Event 1: Source IP 45.33.x.x | App: HR_Portal | Action: Block | Reason: Access Policy Deny (Group Mismatch)
Event 2: Source IP 185.15.x.x | App: N/A | Action: Block | Reason: Threat Intel (Category: Botnet)
Event 3: Source IP 8.8.x.x | App: Finance_DB | Action: Allow | Reason: Policy Match
Event 4: Source IP 103.45.x.x | App: N/A | Action: Block | Reason: Threat Intel (Category: Spam Source)
Based on the log snippet, which TWO statements accurately describe the behavior of the active TIS enforcement mechanism?