Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

BCCPP Questions and Answers

Note! Following BCCPP Exam is Retired now. Please select the alternative replacement for your Exam Certification.

BCCPP Questions and Answers

Question # 6

A global policy trace can be invoked from which two of these sources? (Select 2)

A.

Management Console

B.

CLI

C.

VPM

D.

CPL

Full Access
Question # 7

Which of the following statements are true about Bandwidth Management Hierarchies and Priorities? (Choose all that apply)

(a) Child classes can have children of their own.

(b) If no limit is set, packets are sent as soon as they arrive.

(c) Priorities are set to a class to give precedence over other classes.

(d) If there is excess bandwidth, the child class will always get the first opportunity to use it.

A.

a, b & c only

B.

a, b & d only

C.

b, c & d only

D.

All of the above

Full Access
Question # 8

By default, which standard keyring is used to authenticate a ProxySG to other devices?

A.

authentication-key

B.

default

C.

appliance-key

D.

default-untrusted

Full Access
Question # 9

Which one of these statements best describes how policy checkpoints evaluate the installed policy on a ProxySG?

A.

The Client In checkpoint decides which rules will be evaluated by the other checkpoints.

B.

At each checkpoint, a decision is made whether to allow or deny the transaction.

C.

The Server In checkpoint decides which rules will be evaluated by the other checkpoints.

D.

Relevant rules are evaluated at each checkpoint based on the information about the transaction that is available at that point.

Full Access
Question # 10

When configuring forwarding in PoxySG, what are the possible load balancing methods?

(Choose all that apply)

(a) Round Robin

(b) Fastest ICMP Reply

(c) Least Connections

(d) Least Delay

A.

a & c only

B.

b & d only

C.

a & d only

D.

b & c only

Full Access
Question # 11

SGOS is based on which other operating system?

A.

VxWorks

B.

pSOS

C.

Unix

D.

Windows

E.

None of the above

Full Access
Question # 12

Hostname of the BCAAA= serverl

DNS suffix =bluecoat.com

Hostname of the Bluecoat SG = sgo1

Referring to the above information, what is the correct syntax for the SPN command in the Domain Controller?

A.

setspn-A HTTP/serverl.bluecoat.com sg01

B.

setspn-L HTTP/serverl.bluecoat.com sg01

C.

setspn-A HTTP/sg01.bluecoat.com server1

D.

setspn-D HTTP/serverl.bluecoat.com sg01

Full Access
Question # 13

When the ProxySG processes a client request to a server that requires a client certificate, from where does the ProxySG obtain the certificate during transaction processing?

A.

From the server.

B.

From a certificate store on the ProxySG.

C.

From the client.

Full Access
Question # 14

What type of SGOS software worker can be invoked to perform pipelining of HTTP requests?

A.

Client worker.

B.

Server worker.

C.

Retrieval worker.

D.

SGOS software workers do not perform pipelining of HTTP requests.

Full Access
Question # 15

What does this CPL layer do?

A.

Sets the transaction status to Allow for all users who have the group attribute of Administrators.

B.

This policy contains a syntax error and cannot be installed.

C.

Nothing.

D.

Sets the group attribute of Administrators for all users whose transactions are allowed.

Full Access
Question # 16

In CPL, using the define category construct with a list of 1,000 URLs usually produces more efficient code than explicitly specifying each individual URL as a separate test.

A.

True

B.

False

Full Access
Question # 17

Name two ways by which the ProxySG can determine that a DDOS attack is in progress. (Select 2)

A.

Excessive number of requests from a specific server.

B.

Excessive number of HTTP connections from a specific client.

C.

The ProxySG becomes unable to communicate with its configured DNS server(s).

D.

Sustained bandwidth utilization at or near 100%.

Full Access
Question # 18

Who plays the role of the trusted third party, when client and server communicate via Kerberos?

A.

NTLM (NT LAN Manager)

B.

KDC (Key Distribution Center)

C.

PKI (Public Key Infrastructure)

D.

SSL Certificate Authority

Full Access
Question # 19

Where do you most appropriately configure the ProxySG to decide whether to authenticate guest users?

A.

In the CLI.

B.

In the Management Console.

C.

In policy.

Full Access
Question # 20

Bandwidth minimum does not work in an explicit deployment model.

A.

True

B.

False

Full Access
Question # 21

The ProxySG policy engine allows an administrator to create policy based on any MIME type, File Extension or File Signature (first bytes in the response body).

A.

True

B.

False

Full Access
Question # 22

In regards to authentication the ProxySG does not support origin-redirects with CONNECT method.

A.

True

B.

False

Full Access
Question # 23

The ProxySG compiles CPL code at installation time and performs optimizations that might not have been written into the code.

A.

True

B.

False

Full Access
Question # 24

Objects that require more server-side bandwidth and response time are less likely to be deleted from the cache. This statement best describes which ProxySG caching technique?

A.

Popularity content

B.

Pipelining

C.

Cost-based deletion

D.

Asynchronous adaptive refresh

Full Access
Question # 25

In ProxyAV anti-virus scanners are____

A.

multiple parallel threads sharing the same code and the same address space

B.

multiple parallel processes not sharing the same address space

C.

asynchronous calls to remote scanner hardware

D.

synchronous procedure calls within ProxyAV

Full Access
Question # 26

What is the meaning of the metacharacter? (question mark) in regular expressions?

A.

escape character

B.

any character except newline

C.

zero or one character

D.

zero or more characters

Full Access
Question # 27

Which method of controlling downloads of certain file types works fastest on ProxySG?

A.

Apparent Data Type

B.

MIME Type

C.

File extension

Full Access
Question # 28

When creating policy in the VPM, where can you instruct the ProxySG to enable or disable pipelining of referenced objects?

A.

In a Web Content layer.

B.

In a Cache Control layer.

C.

In a Web Access layer.

D.

You cannot do this in the VPM.

Full Access
Question # 29

Which policy file can be automatically updated when the ProxySG detects changes to an external source?

A.

Threat protection policy file.

B.

Central policy file.

C.

Forward policy file.

D.

Local policy file.

Full Access
Question # 30

If the ProxySG and a client cannot successfully authenticate the use of Kerberos credentials during authentication in a realm where use of Kerberos credentials is enabled, what happens to the authentication request?

A.

The request automatically downgrades and tries to use Basic credentials.

B.

The request automatically downgrades and tries to use NTLM credentials, and then Basic credentials.

C.

The request fails.

Full Access
Question # 31

A cookie without an expire value will___

A.

last until the client cleats cookies from the browser

B.

last until the client closes the browser session

C.

last until the client logs off

Full Access