<< Prev Question Next Question >>

Question 18/38

What does the authentication mode specify?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (38q)
Question 1: What is one drawback to using apparent data type to detect t...
Question 2: SGOS is based on which other operating system?...
Question 3: When policy created in the VPM is installed, what two files ...
Question 4: What needs to be selected for the Explicit HTTP service to b...
Question 5: Where are surrogate credentials stored?...
Question 6: If you have configured continuous uploading of access logs a...
Question 7: When must BCAAA be used?
Question 8: What would happen if the ProxySG did not use surrogate crede...
Question 9: Of the methods that the ProxySG uses to detect file type, wh...
Question 10: What happens when the ProxySG bypasses traffic?...
Question 11: What stops further rule processing in a layer?...
Question 12: If you lose the password to the setup console, which of thes...
Question 13: Why is Kerberos performance better than NTLM?...
Question 14: The ProxySG simultaneously opens multiple server connections...
Question 15: Which deployment method represents a single point of failure...
Question 16: Name three methods by which client configuration can be perf...
Question 17: Which SGOS edition is designed for Secure Web Gateway deploy...
Question 18: What does the authentication mode specify?...
Question 19: What does each proxy service define? (Choose two.)...
Question 20: When does the ProxySG establish an Schannel?...
1 commentQuestion 21: Which Symantec product is best suited for simultaneously adm...
Question 22: In which client connection type are user agents aware that a...
Question 23: Which built-in tool would you use to monitor external resour...
Question 24: Which of the following are always included in both the reque...
Question 25: Where in the Management Console would you look to find all s...
Question 26: In the Management Console, how can you determine the serial ...
Question 27: Which of the following is not a VPM trigger object?...
Question 28: Does the policy trace flag malfunctioning policy?...
Question 29: Which services are included in the Intelligence Services Adv...
Question 30: When the ProxySG uses a virtual URL for user authentication,...
Question 31: Which of the following are recommended to improve CPU perfor...
Question 32: Where is the WebFilter database stored? (Select two)...
Question 33: Where does ProxySG object caching usually result in the most...
Question 34: Why is authentication using Basic credentials typically used...
Question 35: How do you create a new built-in exception of the ProxySG?...
Question 36: A primary difference between a proxy server and a firewall i...
Question 37: Which of the following is NOT a component of a proxy service...
Question 38: What rules in a VPM layer are being evaluated, what causes e...