How can an administrator determine the serial number of the ProxySG in the Management Console? (Choose the best answer.)
How can an administrator determine the serial number of the ProxySG in the Management Console? (Choose the best answer.)A . This information is not visible from the Management ConsoleB . Go to Statistics > AdvancedC . Go to Configuration > NetworkD . The serial number is contained in the top...
Which log format is associated with the main log facility by default? (Choose the best answer.)
Which log format is associated with the main log facility by default? (Choose the best answer.)A . httpB . elffC . mainD . bcreportermain_v1View AnswerAnswer: D
What is a component of a proxy service listener? (Choose the best answer.)
What is a component of a proxy service listener? (Choose the best answer.)A . Encryption hashB . Source IP addressC . Proxy modeD . Proxy typeView AnswerAnswer: B
How does an administrator create a single group in policy that includes multiple client addresses? (Choose the best answer.)
How does an administrator create a single group in policy that includes multiple client addresses? (Choose the best answer.)A . Create a combined policy object.B . Include the addresses in a layer guard.C . This can only be done using CPE . Use a dedicated layer.View AnswerAnswer: A
Which type of object is a Notify User object in the VPM? (Choose the best answer.)
Which type of object is a Notify User object in the VPM? (Choose the best answer.)A . DestinationB . ActionC . TrackD . SourceView AnswerAnswer: B
What should an administrator utilize in policies to specify which traffic should be decrypted? (Choose the best answer.)
What should an administrator utilize in policies to specify which traffic should be decrypted? (Choose the best answer.)A . ListenersB . URL categoriesC . The SSL ProxyD . All proxy servicesView AnswerAnswer: A
When must BCAAA be used? (Choose the best answer.)
When must BCAAA be used? (Choose the best answer.)A . When an administrator needs to establish more than one Schannel to increase performance.B . When more than one ProxySG are deployedC . When the ProxySG is unable to directly utilize APIs that require traditional operating systems.D . When Basic credentials...
In which caching technique does the ProxySG open multiple server connections to retrieve objects referenced on a web page before the client actually issues the requests for those objects? (Choose the best answer.)
In which caching technique does the ProxySG open multiple server connections to retrieve objects referenced on a web page before the client actually issues the requests for those objects? (Choose the best answer.)A . Popularity contestB . Cost-based deletionC . Asynchronous adaptive refreshD . PipeliningView AnswerAnswer: D
Which kind of authentication credentials might Schannel congestion in IWA direct realms be an issue with? (Choose the best answer.)
Which kind of authentication credentials might Schannel congestion in IWA direct realms be an issue with? (Choose the best answer.)A . NTLMB . Surrogate credentialsC . KerberosD . BasicView AnswerAnswer: B
When will a policy trace report a rule processing result of “N/A”? (Choose the best answer.)
When will a policy trace report a rule processing result of “N/A”? (Choose the best answer.)A . When the layer containing the rule is disabledB . When the rule is not reached during evaluationC . When the rule makes no sense for the specific transaction being processedD . When the...