A global policy trace can be invoked from which two of these sources? (Select 2)
Which of the following statements are true about Bandwidth Management Hierarchies and Priorities? (Choose all that apply)
(a) Child classes can have children of their own.
(b) If no limit is set, packets are sent as soon as they arrive.
(c) Priorities are set to a class to give precedence over other classes.
(d) If there is excess bandwidth, the child class will always get the first opportunity to use it.
By default, which standard keyring is used to authenticate a ProxySG to other devices?
Which one of these statements best describes how policy checkpoints evaluate the installed policy on a ProxySG?
When configuring forwarding in PoxySG, what are the possible load balancing methods?
(Choose all that apply)
(a) Round Robin
(b) Fastest ICMP Reply
(c) Least Connections
(d) Least Delay
Hostname of the BCAAA= serverl
DNS suffix =bluecoat.com
Hostname of the Bluecoat SG = sgo1
Referring to the above information, what is the correct syntax for the SPN command in the Domain Controller?
When the ProxySG processes a client request to a server that requires a client certificate, from where does the ProxySG obtain the certificate during transaction processing?
What type of SGOS software worker can be invoked to perform pipelining of HTTP requests?
In CPL, using the define category construct with a list of 1,000 URLs usually produces more efficient code than explicitly specifying each individual URL as a separate test.
Name two ways by which the ProxySG can determine that a DDOS attack is in progress. (Select 2)
Who plays the role of the trusted third party, when client and server communicate via Kerberos?
Where do you most appropriately configure the ProxySG to decide whether to authenticate guest users?
The ProxySG policy engine allows an administrator to create policy based on any MIME type, File Extension or File Signature (first bytes in the response body).
In regards to authentication the ProxySG does not support origin-redirects with CONNECT method.
The ProxySG compiles CPL code at installation time and performs optimizations that might not have been written into the code.
Objects that require more server-side bandwidth and response time are less likely to be deleted from the cache. This statement best describes which ProxySG caching technique?
What is the meaning of the metacharacter? (question mark) in regular expressions?
Which method of controlling downloads of certain file types works fastest on ProxySG?
When creating policy in the VPM, where can you instruct the ProxySG to enable or disable pipelining of referenced objects?
Which policy file can be automatically updated when the ProxySG detects changes to an external source?
If the ProxySG and a client cannot successfully authenticate the use of Kerberos credentials during authentication in a realm where use of Kerberos credentials is enabled, what happens to the authentication request?