Which of the following statements are true about Reverse Proxy deployment?
Which of the following statements are true about Reverse Proxy deployment?(Choose all that
apply)
(a) Forwarding hosts in the forwarding file must be defined as “server” style
(b) Default-scheme in forwarding file is supported
(c) Protocol conversion between HTTPS <- ->HTTP are automatic
(d) ProxySG should be set with default DENY policy
Which of the following statements are true about ProxySG Protocol Detection feature?
Which of the following statements are true about ProxySG Protocol Detection feature?
(Choose all that apply)
(a) Protocol detection is performed on the server’s response.
(b) Protocol detection is performed on the client’s request.
(c) Enabling Detect Protocol option will automatically enable early intercept attribute in proxy
services.
(d) Protocol detection is performed by looking at the TCP port number.
What options are available to regain access to the appliance?
An administrator created a PIN for the ProxySG front panel, disabled the built-in administrative
account and introduced policy-based admin authoritarian, and secured die serial port. After this
was done, all the PINs, passwords and policy settings were lost. What options are available to
regain access to the appliance? (Choose all that apply)
(a) Return ProxySG appliance to Blue Coat to restore a default SGCS image
(b) Restore the factory settings by pressing and holding a reset button for 5 seconds, configure the
appliance anew or restore its configuration from a backup
(c) Try out all 10000 combinations of PIN for the front panel until you find the right one
(d) Remove the hard disk from the ProxySG, connect it as an external SAT A disk to any
Windows or Linux computer; clear the admin entry in the /etc/ pssswd file on that disk. Put the
hard disk back in ProxySG, start it up and reset the admin’s password.
What is the effect of the above CPL code?
url.regex=!\.html$ d\ DENY
What is the effect of the above CPL code?
SSL tunneling)
The Connect HTTP method is reserved for use with a proxy that can dynamically switch to being a
tunnel (e.g. SSL tunneling)
Which of the following statements are true about dynamic bypass list?
Which of the following statements are true about dynamic bypass list? (Choose all that apply)
(a) Configured polices will not be enforced on client request if the request matches an entry in the
bypass list.
(b) Dynamic bypass entries are lost when ProxySG is restarted
(c) If request made to a site in a forwarding policy is in the bypass list, the site is inaccessible
(d) Dynamic bypass parameters can be configured on Management Console and CLI.
Forward proxy of SSL allows applying policies to encrypted SSL data.
Forward proxy of SSL allows applying policies to encrypted SSL data.
You can NOT use a self-signed certificate when intercepting SSL traffic.
You can NOT use a self-signed certificate when intercepting SSL traffic.
The ProxySG gives you the ability to write policies through.
The ProxySG gives you the ability to write policies through.
What criterion is NOT used to determine location awareness of a ProxyClient
What criterion is NOT used to determine location awareness of a ProxyClient