What stops further rule processing in a layer?
What stops further rule processing in a layer?A . When the final rule on the layer is reachedB . When two rules matchC . When a later rule contradicts an earlier ruleD . The first rule in the layer that matchesView AnswerAnswer: D Explanation: Reference: https://origin-symwisedownload.symantec.com/resources/webguides/sgos/policy/Learn/ aboutlayerandruleeval/layerguards.htm
A newly-shipped physical ProxySG contains what type of license?
A newly-shipped physical ProxySG contains what type of license?A . TrialB . DemoC . PermanentD . ProvisionalView AnswerAnswer: A Explanation: Reference: https://origin-symwisedownload.symantec.com/resources/webguides/proxysg/6.2/ acceleration_webguide/Content/02Tasks/Maintenance/view_license_information_ta.htm
When the ProxySG uses a virtual URL for user authentication, what must the virtual URL point to?
When the ProxySG uses a virtual URL for user authentication, what must the virtual URL point to?A . The IP address of the origin content serverB . A hostname that the user agent can DNS-resolve to an IP addressC . None of these answersD . The IP address of the...
Why is Kerberos performance better than NTLM?
Why is Kerberos performance better than NTLM?A . It uses less encryptionB . None of these answersC . Only two round trips are required between the browser and an authentication serverD . It works with later versions of Microsoft WindowsView AnswerAnswer: B Explanation: Reference: https://origin-symwisedownload.symantec.com/resources/webguides/proxysg/certification/ authentication_webguide/Content/Topics/Authentication/Concepts/IWA_auth_protocols_co.htm
What can proxy servers do? (Choose three.)
What can proxy servers do? (Choose three.)A . Rewrite request messagesB . Interpret request messagesC . Block malicious contentD . Scan traffic for virusesView AnswerAnswer: ACD Explanation: Reference: https://origin-symwisedownload.symantec.com/resources/webguides/proxysg/ security_first_steps/Content/PDFs/Malware_Prevention_Solution.pdf
Which type of authentication realm does not require communication with an external authentication server?
Which type of authentication realm does not require communication with an external authentication server?A . IWA realmB . Kerberos realmC . Local realmView AnswerAnswer: C
By default, HTTP traffic that is logged is recorded to which log facility?
By default, HTTP traffic that is logged is recorded to which log facility?A . bcreportermain_v1B . mainC . elfD . httpView AnswerAnswer: B Explanation: Reference: https://wikileaks.org/spyfiles/files/0/241_BLUECOAT-SGOS_CMG_5.1.4_9.pdf (p.7)
What does the authentication mode specify?
What does the authentication mode specify?A . The time-to-live for credentialsB . The protocol used to communicate with the authentication serviceC . The challenge type and the accepted surrogateD . Whether the credentials will be encryptedView AnswerAnswer: C
On the ProxySG, can more than one authentication realm be active at any given time?
On the ProxySG, can more than one authentication realm be active at any given time?A . NoB . YesC . Only in explicit modeD . Only in transparent modeView AnswerAnswer: B
Which is the default TCP port for HTTP?
Which is the default TCP port for HTTP?A . 20B . 80C . 443D . 43View AnswerAnswer: B Explanation: Reference: https://support.symantec.com/en_US/article.TECH242551.html