The ProxySG can create configurable access logs for FTP, HTTP, and Telnet but not for Peer-toPeer or Real Media
Which of the following policies CANNOT be implemented on the ProxyAV? (Choose all that apply)
(a) Blocking viruses, worms, spyware and trojans
(b) Blocking file types using apparent data type (file signature)
(c) Blocking files that exceed a size limit set by the administrator
(d) Blocking password protected archive files
The SSL certificate returned by the Management Console upon HTTPS access____.
ProxySG has to be deployed inline (in bridging mode) or virtually inline (using WCCP or an L4
switch) in order to block IM traffic.
Which HTTP error code corresponds to the ProxySG default exception identifier policy_denied?
Which of the following are true about the rules processing in the VPM? (Choose all that apply)
(a) Rules are processed in a top down sequence.
(b) Layers are processed from left to right regardless of type.
(c) Layers are processed according to layer type.
(d) Layers of the same type are processed from left to right.
Which capabilities are limited in Blue coat Reporter standard edition compared to Enterprise
edition? (Choose all that apply)
(a)Data profile number is limited to five
(b)Reports can be displayed, but cannot be saved as PDF or CSV
(c)Only single processor is supported
(d)Report customization is limited
Find the configuration or management activity that is NOT among the functions of the Blue Coat
Director CANNOT be used?
In the VPM, source triggers can be used in conjunction with the ICAP RESPMOD action.
What can be concluded about this request processing order?