Which two (2) locations is the WebFilter database stored in?
Which two (2) locations is the WebFilter database stored in? (Choose two.) A. At several data centers around the world B. In the WebPulse data cache C. On clients’ mobile devices D. On a properly licensed ProxySG E. Symantec Management Center
Which service setting determines whether the traffic is passed to the SSL proxy or the HTTP proxy when a brows
Which service setting determines whether the traffic is passed to the SSL proxy or the HTTP proxy when a browser is configured to use an explicit proxy connection to the ProxySG? (Choose the best answer.) A. Enable SSL/TLS B. Detect protocol C. Authenticate-401 D. Forward client cert
In which caching technique does the ProxySG open multiple server connections to retrieve objects referenced on
In which caching technique does the ProxySG open multiple server connections to retrieve objects referenced on a web page before the client actually issues the requests for those objects? (Choose the best answer.) A. Popularity contest B. Cost-based deletion C. Asynchronous adaptive refresh D. Pipelining
How does an administrator create a single group in policy that includes multiple client addresses?
How does an administrator create a single group in policy that includes multiple client addresses? (Choose the best answer.) A. Create a combined policy object. B. Include the addresses in a layer guard. C. This can only be done using CPL. D. Use a dedicated layer.
What is typically the biggest load on a CPU when managing encrypted traffic?
What is typically the biggest load on a CPU when managing encrypted traffic? (Choose the best answer.) A. Emulating certificates B. Using the SHA-2 hash function C. Using RSA encryption D. The need for redirection
What is the default TCP port for HTTP?
What is the default TCP port for HTTP? (Choose the best answer.) A. 20 B. 443 C. 80 D. 43
Which two (2) situations might require a reverse DNS lookup?
Which two (2) situations might require a reverse DNS lookup? (Choose two.) A. If the access log is enabled and a field in the access log requires a hostname B. If both the primary and alternate forward DNS servers go down C. If primary authentication fails D. If a policy trigger event requires it E. […]
Which type of object is a Notify User object in the VPM?
Which type of object is a Notify User object in the VPM? (Choose the best answer.) A. Destination B. Action C. Track D. Source
When must BCAAA be used?
When must BCAAA be used? (Choose the best answer.) A. When an administrator needs to establish more than one Schannel to increase performance. B. When more than one ProxySG are deployed C. When the ProxySG is unable to directly utilize APIs that require traditional operating systems. D. When Basic credentials are used
Which two (2) categories of traffic are typically left encrypted?
Which two (2) categories of traffic are typically left encrypted? (Choose two.) A. Gambling B. News Media C. Social Media D. Financial Services E. Health