<< Prev Question Next Question >>

Question 123/202

Which Blue Coat product is best suited for simultaneously administering a large number of ProxySG appliances?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (202q)
Question 1: Name two settings that can be configured in a forwarding gro...
Question 2: When the ProxySG determines whether a user is a member of an...
Question 3: After creating CPL in the local policy file, the policy is i...
Question 4: Which of the following are some of the general requirements ...
Question 5: Which of the following access log formats are supported by t...
Question 6: Is it possible to run more than one version of a BCAAA accep...
1 commentQuestion 7: What type of filesystem does SGOS use?...
Question 8: Can the ProxySG initiate a transaction that does not corresp...
Question 9: By default, what type of authentication challenge will the u...
Question 10: After creating CPL in the local policy file, the ProxySG imp...
Question 11: Where can you get the SNMP MIBs for the version of SGOS runn...
Question 12: What are the two functions of configuring forwarding in Prox...
Question 13: url.regex=!\.html$ d\ DENY What is the effect of the above C...
Question 14: In which of the following ways can Access Logging be enabled...
Question 15: If cookie surrogates are used with a user agent that does no...
Question 16: Which method of controlling downloads of certain file types ...
Question 17: http://support.bluecoat.com/products/proxysg/sg9000.html?cus...
Question 18: When a client receives an HTTP 302 response from a server, t...
Question 19: Which statement best describes the payload that is encapsula...
1 commentQuestion 20: What are the three levels of the ProxySG authentication cach...
Question 21: In CPL, what is the difference between Deny and Force Deny?...
Question 22: Which one of these statements best describes how the ProxySG...
Question 23: Which of these are the features of a Blue Coat Director? (Ch...
Question 24: In which two of these cases must you specify a virtual URL t...
Question 25: You can NOT use a self-signed certificate when intercepting ...
Question 26: ProxySG is configured to permit error but guest authenticati...
Question 27: Which policy file can be automatically updated when the Prox...
Question 28: Which of the following cashing techniques utilize retrieval ...
Question 29: When implementing failover with ProxySG appliances, configur...
Question 30: By default, which standard keyring is used to authenticate a...
Question 31: Apparent Data Type objects can be created in the VPM for whi...
Question 32: When SGOS processes a client HTTP request, how many server w...
Question 33: Which of the following statements are true about dynamic byp...
Question 34: Which statement is correct about WWW-Authenticate header?...
Question 35: Who plays the role of the trusted third party, when client a...
Question 36: Where do you most appropriately configure the ProxySG to dec...
Question 37: The bcreportermain_v1 access log format has a configurable o...
Question 38: CPL is required when creating which types of policy?...
Question 39: Without asking a user or physically inspecting their compute...
Question 40: What are the three types of ProxySG surrogate credentials? (...
Question 41: Which level(s) of global policy trace contain information ab...
Question 42: What are the two main functions of configuring forwarding in...
Question 43: Which type of SGOS worker performs most transactions with an...
1 commentQuestion 44: If a CPL rule contains more than one trigger, how are the tr...
Question 45: A global policy trace can be invoked from which two of these...
Question 46: Which of the following steps are not required when configuri...
Question 47: Which of the following are the benefits of using Bandwidth M...
Question 48: Steaming traffic is better managed by using ProxySG's admiss...
Question 49: NTLM credentials or Kerberos credentials: Which credentials ...
Question 50: In a CPL back reference of the form $(n), are references num...
Question 51: What is the protocol used for Blue Coat Director to communic...
Question 52: Which of these possible problems does a nearly-full ProxySG ...
Question 53: When permitting guest authentication, what is one way that c...
Question 54: What is the meaning of the metacharacter (question mark) in ...
Question 55: What is a precondition for using L2 MAC rewrite with WCCP?...
Question 56: In CPL, rules that have similar syntax can be grouped into w...
Question 57: When authenticating a guest user in an LDAP realm, which of ...
Question 58: Which statement is correct about Proxy-Authorization header?...
Question 59: The ProxySG simultaneously opens multiple server connections...
Question 60: When a backup ProxySG takes over because the master fails, w...
Question 61: When a &lt;proxy&gt; policy layer has set one or more action...
Question 62: What are the advantages that you may get in deploying ProxyS...
1 commentQuestion 63: When will a policy trace report a rule processing result of ...
Question 64: An excessively high internal CPU temperature can be detected...
Question 65: When creating policy in the VPM, where can you instruct the ...
Question 66: By default, how often is the standard SSL trust package upda...
Question 67: Which of the following hostnames are NOT matched by the regu...
Question 68: When a ProxyClient setup file is manually on a client's comp...
Question 69: http://www.bluecoat.com/index.html?user=bobkent For the abov...
Question 70: Which of the following authentication mode will allow you to...
Question 71: ProxySG can cache videos played by Adobe Flash based video p...
Question 72: Which of the following are true when attempting to deny acce...
Question 73: Which of the following Health Checks can be defined for a fo...
Question 74: By default, are proxy transactions allowed or denied?...
Question 75: If you wish to use an SSL trust package other than the one t...
Question 76: When the ProxySG processes a client request to a server that...
Question 77: In CPL, using the define category construct with a list of 1...
Question 78: Which regular expression should you test against a URL to ma...
Question 79: What type of authentication challenge is issued when using t...
Question 80: http://support.bluecoat.com/products/proxysg/sg9000.html?cus...
Question 81: In an SSL transaction in which the server's certificate is n...
Question 82: Which of the following format can be used in troubleshooting...
1 commentQuestion 83: SGOS is based on which other operating system?...
Question 84: The ProxySG compiles CPL code at installation time and perfo...
Question 85: In explicit proxy, what will happen to a connection that is ...
Question 86: How can you instruct the ProxySG to disregard the HTTP reque...
Question 87: There is a hard coded limit to the number of concurrent conn...
Question 88: Which policy file is processed last?...
Question 89: Which one of these statements is NOT true about the ProxySG ...
Question 90: When a user has credentials in an IWA realm and already has ...
Question 91: When ProxyClient is installed on a mobile workstation, from ...
Question 92: Can you simultaneously use policy created in the VPM and wri...
Question 93: When one ProxySG forwards HTTP requests to another ProxySG, ...
1 commentQuestion 94: Name two ways by which the ProxySG can determine that a DDOS...
Question 95: Hostname of the BCAAA= serverl DNS suffix =bluecoat.com Host...
Question 96: If a user cannot be derived through the Window SSO realm, th...
Question 97: When SGOS processes a client HTTP request, how is a client w...
Question 98: Objects that require more server-side bandwidth and response...
Question 99: With ProxySG failover, the failover Virtual IP address can b...
Question 100: Health checks are automatically created under which scenario...
Question 101: When performing Kerberos authentication with an explicit pro...
Question 102: At which checkpoint does the rewrite () perform the TWURL mo...
Question 103: Is it possible to run more than one version of a BCAAA proce...
Question 104: Which of these must be specified on a ProxySG to enable its ...
Question 105: A &lt;cache&gt;policy layer in CPL can best be implemented i...
Question 106: True or false: The ProxySG can apply policy to Flash traffic...
Question 107: Which of the following are true when enabling the early inte...
Question 108: The ProxySG policy engine allows an administrator to create ...
Question 109: What criterion is NOT used to determine location awareness o...
Question 110: Log format variable rs(Content-Type) always refers to Conten...
Question 111: The ProxySG acts as both an ICAP client and ICAP server....
Question 112: Which client deployment methods support the 407 Proxy Authen...
Question 113: Perl statements can be included into CPL code as part of pol...
Question 114: A Web Authentication layer in the VPM can be best implemente...
Question 115: Which policy file is processed first?...
Question 116: Which of the following statements are true? (Choose all that...
Question 117: What type of SGOS software worker can be invoked to perform ...
Question 118: The Access Control List (ACL) option in the management conso...
Question 119: If a user agent that does not support authentication tries t...
Question 120: When writing CPL, should layers containing the most general ...
Question 121: The authentication mode origin-ip-redirect allows an adminis...
Question 122: Is it must the ProxySG use BCAAA to perform user authenticat...
Question 123: Which Blue Coat product is best suited for simultaneously ad...
Question 124: Which of the following options are configured when implement...
Question 125: When creating a TCP tunnel service in explicit mode, you mus...
Question 126: Where does ProxySG object caching usually result in the most...
Question 127: If a mobile client is using ProxyClient and sends traffic th...
Question 128: When analyzing an authentication error, which of these diagn...
Question 129: In a network with three ProxySG appliances using IWA realms ...
Question 130: What is the pre-defined username that can be used to allow g...
Question 131: Which of the following is NOT true about global and per-rule...
Question 132: When configuring Blue Coat Director, how can an administrato...
Question 133: In which types of ProxySG realms does the ProxySG join the A...
Question 134: Bandwidth minimum does not work in an explicit deployment mo...
Question 135: ICAP responses may be cached on a ProxySG, i.e, for some Web...
Question 136: A service can be configured to listen in explicit and transp...
Question 137: When using a transparent proxy connection, the ProxySG detec...
Question 138: http://support.bluecoat.com/products/proxysg/sg9000.html?cus...
Question 139: While configuring Blue Coat directory, what is an Overlay?...
Question 140: What is the meaning of the metacharacter * (asterisk) in reg...
Question 141: Which of the following options are configured when implement...
Question 142: The ProxySG is intercepting Flash traffic. Client A requests...
Question 143: What is the meaning of the metacharacter \ (backslash) in re...
Question 144: Which of these proxy services must be enabled on the ProxySG...
Question 145: When the ProxySG processes installed policy as part of a cli...
Question 146: Which of the following methods can the Windows SSO utilize t...
Question 147: When performing anti-virus scanning using Blue Coat applianc...
Question 148: In a hybrid configuration using the ProxySG in conjunction w...
Question 149: Which of the following statements are true about ProxySG Pro...
Question 150: When a ProxySG is configured to use authentication mode auto...
Question 151: What are the possible ways of creating bandwidth classes? (a...
Question 152: In a cookie in the user's web browser, in a ProxySG authenti...
Question 153: Which authentication realm is NOT supported for authenticati...
Question 154: Which one of these statements is NOT true about the caching ...
Question 155: A policy trace can be enabled for any layer type....
Question 156: Which of the following statements are true about Reverse Pro...
Question 157: On the ProxySG, where can you specify whether a client is pe...
Question 158: By, default is a Forwarding layer in the VPM processed befor...
Question 159: Which authentication modes would result in a user-agent rece...
Question 160: A cookie without an expire value will ___...
Question 161: How must you configure the RTMP proxy service to process Fla...
Question 162: The ProxySG ICAP implementation is fully compatible with whi...
Question 163: To create policy that tests only for the authentication erro...
Question 164: When configuring reverse proxy with SSL, what are the 3 poss...
Question 165: Log format variable s-ip always refers to...
Question 166: Which one of these statements best describes how policy chec...
Question 167: When a TCP health check responds as "healthy" then...
Question 168: The HTTP request header Pragma: no-cache performs the same f...
Question 169: When a URL-based trigger is used in CPL, the compiler analyz...
Question 170: When a downstream ProxySG requests an object that already is...
Question 171: Organize these CPL components into descending order based on...
Question 172: Which method of controlling downloads of certain file types ...
Question 173: In Kerberos authentication that uses BCAAA, which two entiti...
Question 174: The Content-encoding header is used to declare the MIME type...
Question 175: What are the available actions for any given category, when ...
Question 176: Which of these aspects of ProxySG behavior cannot be control...
Question 177: Which standard CA certificate list on the ProxySG is normall...
Question 178: Which of the following steps have to be performed to support...
Question 179: By default, what method does the ProxySG use to balance traf...
Question 180: What information is stored in a policy trace for a transacti...
Question 181: What does this CPL layer do?
Question 182: An HTTP request containing which header instructs the conten...
Question 183: Which authentication mode is generally more secure: Origin I...
Question 184: At which checkpoint does the rewrite_url_prefix perform the ...
Question 185: Which header cannot be sent together with an HTTP 407 status...
Question 186: If the ProxySG and a client cannot successfully authenticate...
Question 187: When creating a policy-driven trace, which CPL property spec...
Question 188: In a typical client HTTP request, identify the four principa...
Question 189: What happens when a disk is removed from a ProxySG while it ...
Question 190: When the ProxySG processes a client request to a server that...
Question 191: If multiple users from different IP addresses have been auth...
Question 192: Which types of requests are likely to be served the fastest?...
Question 193: Which of the following are obvious advantages of having a Pr...
Question 194: When configuring forwarding in PoxySG, what are the possible...
Question 195: In CPL, what is the difference between Allow and OK?...
Question 196: In CPL, which of the following are possible results of a pol...
Question 197: Which of the following statements are true about Bandwidth M...
Question 198: Is SGOS a 32-bit or 64-bit operating system?...
Question 199: If a CPL rule is not part of a policy layer, when is it proc...
Question 200: In a transparent proxy that is intercepting HTTP, how can an...
Question 201: http://support.bluecoat.com/products/proxysg/sg9000.html?cus...
Question 202: How can you test whether an authentication realm has been pr...