Administration of Blue Coat ProxySG 6.6 v1.0 (250-430)

Page:    1 / 5   
Total 70 questions

Which of the following is NOT a component of a proxy service listener?

  • A. Source IP address
  • B. Port range
  • C. Destination IP address
  • D. Proxy type


Answer : C

In which client connection type are user agents aware that a proxy has been deployed?

  • A. Explicit proxy
  • B. In every connection type
  • C. Inline
  • D. Transparent


Answer : A

The ProxySG simultaneously opens multiple server connections to retrieve objects referenced on a web page before the client actually issues the requests for those objects. This statement best describes which ProxySG caching technique?

  • A. Asynchronous adaptive refresh
  • B. Popularity contest
  • C. Pipelining
  • D. Cost-based deletion


Answer : C

Reference:
https://origin-symwisedownload.symantec.com/resources/webguides/proxysg/security_first_steps/Content/Solutions/Caching/about_cache.htm

Of the methods that the ProxySG uses to detect file type, which one is usually the most accurate?

  • A. Checking the HTTP content type (or MIME type)
  • B. Performing an anti-virus scan
  • C. Detecting apparent data type
  • D. Checking the file extension


Answer : A

Where in the VPM can you create a unique instance for each certificate?

  • A. SSL Intercept layer
  • B. Web Content layer
  • C. SSL Access layer
  • D. SSL Proxy layer


Answer : C

When the ProxySG processes installed policy as part of a client transaction, how does it handle a rule that contains a syntax error?

  • A. The ProxySG skips the rule and does not change the accept or deny status of the transaction
  • B. The ProxySG changes the transaction status to Deny and makes an entry in the event log
  • C. The ProxySG stops processing of the layer containing the rule and continues with the next layer, if any
  • D. This cannot happen


Answer : B

Which one of these statements best describes how policy checkpoints evaluate the installed policy on a ProxySG?

  • A. The Server In checkpoint decides which rules will be evaluated by the other checkpoints
  • B. The Client In checkpoint decides which rules will be evaluated by the other checkpoints
  • C. At each checkpoint, a decision is made whether to allow or deny the transaction
  • D. Relevant rules are evaluated at each checkpoint based on the information about the transaction that is available at that point


Answer : C

Which of the following is NOT a component of a log facility?

  • A. Log file
  • B. Protocol
  • C. Upload schedule
  • D. Log format


Answer : C

Reference:
https://wikileaks.org/spyfiles/files/0/241_BLUECOAT-SGOS_CMG_5.1.4_9.pdf

What is typically the biggest load on CPU?

  • A. MD5
  • B. Emulating certificates
  • C. Using RSA
  • D. SHA-2


Answer : C

Which one of these statements best describes how the ProxySG locates an object in its cache?

  • A. The ProxySG uses the hostname in the object"™s URL to determine in which cache directory the object is located
  • B. The ProxySG uses the first 32 bytes of the object"™s URL to determine in which cache directory the object is located
  • C. The ProxySG performs a hash against the URL of the object and uses the hash as the basis for a lookup into the table of cached objects


Answer : C

What can you use to specify which traffic should be encrypted?

  • A. The SSL Proxy
  • B. Listeners
  • C. All proxy services
  • D. Categories


Answer : A

Organize these CPL components into descending order based on how they are organized in policy.

  • A. Layers, rules, conditions, triggers
  • B. Layers, rules, triggers, conditions
  • C. Layers, conditions, rules, triggers
  • D. Triggers, conditions, rules, layers


Answer : A

Where would you look to find a record of all of configuration changes, as well as which administrator account committed those changes?

  • A. Statistics > Advanced
  • B. Active sessions
  • C. Event log
  • D. Access log


Answer : C

What is the primary benefit of using IWA authentication realms?

  • A. Better performance by using NTLM credentials
  • B. Greater security than LDAP
  • C. Ability to use Kerberos credentials
  • D. Single sign-on experience for users


Answer : D

Reference -
https://origin-symwisedownload.symantec.com/resources/webguides/proxysg/6.5/authentication_webguide/Content/Topics/Authentication/Concepts/

IWA_co.htm -

Which deployment method represents a single point of failure?

  • A. None of these answers
  • B. Inline XXX
  • C. Explicit
  • D. Transparent


Answer : B

Reference:
https://www.symantec.com/content/dam/symantec/docs/white-papers/swg-deployment-methodologies-en.pdf

Page:    1 / 5   
Total 70 questions