Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What must the virtual URL point to, when the ProxySG utilizes a virtual URL for user authentication in a transparent deployment? (Choose the best answer.)

A.

The IP address of the origin content server

B.

The IP address of the ProxySG

C.

A hostname that the user agent can DNS-resolve to an IP address

D.

The hostname of the origin content server

In which caching technique are objects that require more server-side bandwidth and response time less likely to be deleted from the cache? (Choose the best answer.)

A.

Round robin

B.

Cost-based deletion

C.

Popularity contest

D.

Asynchronous adaptive refresh

Which section of a policy trace would an administrator locate the original HTTP GET request in? (Choose the best answer.)

A.

Connection info

B.

HTTP section

C.

Policy decision

D.

Header

Which log format is associated with the main log facility by default? (Choose the best answer.)

A.

http

B.

elff

C.

main

D.

bcreportermain_v1

Where does ProxySG object caching usually result in the most bandwidth savings? (Choose the best answer.)

A.

On the server side

B.

On the ProxySG

C.

On the client side

D.

On the enterprise WAN

Which service setting determines whether the traffic is passed to the SSL proxy or the HTTP proxy when a browser is configured to use an explicit proxy connection to the ProxySG? (Choose the best answer.)

A.

Enable SSL/TLS

B.

Detect protocol

C.

Authenticate-401

D.

Forward client cert

What are two (2) methods by which the ProxySG can detect the type of a file that is downloaded? (Choose two.)

A.

Checking the HTTP cache

B.

Performing an anti-virus scan

C.

Checking the file extension

D.

Submitting the URL to WebPulse

E.

Detecting apparent data type

When can more than one authentication realm be active at any given time on the ProxySG? (Choose the best answer.)

A.

Only in explicit mode

B.

Never

C.

Only in transparent mode

D.

When policy is being evaluated

What allows WebPulse to provide real-time revisions to the WebFilter database? (Choose the best answer.)

A.

Dynamic categorization

B.

Creating a local database

C.

Threat risk levels

D.

Configuring application controls

Which SGOS edition is designed for Secure Web Gateway hardware deployments? (Choose the best answer.)

A.

Proxy Edition

B.

Premium Edition

C.

MACH5 Edition

D.

Basic Edition