Which of the following is NOT a component of a proxy service listener?
Answer : C
In which client connection type are user agents aware that a proxy has been deployed?
Answer : A
The ProxySG simultaneously opens multiple server connections to retrieve objects referenced on a web page before the client actually issues the requests for those objects. This statement best describes which ProxySG caching technique?
Answer : C
Reference:
https://origin-symwisedownload.symantec.com/resources/webguides/proxysg/security_first_steps/Content/Solutions/Caching/about_cache.htm
Of the methods that the ProxySG uses to detect file type, which one is usually the most accurate?
Answer : A
Where in the VPM can you create a unique instance for each certificate?
Answer : C
When the ProxySG processes installed policy as part of a client transaction, how does it handle a rule that contains a syntax error?
Answer : B
Which one of these statements best describes how policy checkpoints evaluate the installed policy on a ProxySG?
Answer : C
Which of the following is NOT a component of a log facility?
Answer : C
Reference:
https://wikileaks.org/spyfiles/files/0/241_BLUECOAT-SGOS_CMG_5.1.4_9.pdf
What is typically the biggest load on CPU?
Answer : C
Which one of these statements best describes how the ProxySG locates an object in its cache?
Answer : C
What can you use to specify which traffic should be encrypted?
Answer : A
Organize these CPL components into descending order based on how they are organized in policy.
Answer : A
Where would you look to find a record of all of configuration changes, as well as which administrator account committed those changes?
Answer : C
What is the primary benefit of using IWA authentication realms?
Answer : D
Reference -
https://origin-symwisedownload.symantec.com/resources/webguides/proxysg/6.5/authentication_webguide/Content/Topics/Authentication/Concepts/
IWA_co.htm -