What must the virtual URL point to, when the ProxySG utilizes a virtual URL for user authentication in a transparent deployment? (Choose the best answer.)
In which caching technique are objects that require more server-side bandwidth and response time less likely to be deleted from the cache? (Choose the best answer.)
Which section of a policy trace would an administrator locate the original HTTP GET request in? (Choose the best answer.)
Which log format is associated with the main log facility by default? (Choose the best answer.)
Where does ProxySG object caching usually result in the most bandwidth savings? (Choose the best answer.)
Which service setting determines whether the traffic is passed to the SSL proxy or the HTTP proxy when a browser is configured to use an explicit proxy connection to the ProxySG? (Choose the best answer.)
What are two (2) methods by which the ProxySG can detect the type of a file that is downloaded? (Choose two.)
When can more than one authentication realm be active at any given time on the ProxySG? (Choose the best answer.)
What allows WebPulse to provide real-time revisions to the WebFilter database? (Choose the best answer.)
Which SGOS edition is designed for Secure Web Gateway hardware deployments? (Choose the best answer.)