Can server initiate an HTTP transaction?
What are the best practices using anti-virus software on aWindows machine running Blue Coat Reporter?
When the DRTR successfully categorizes a site, the site is_________ (Choose all that apply)
(a)Addedto the static BCWF database on the ProxySG
(b)Addedto the local database on the ProxySG
(c)Addedto the DRTR database on the ProxySG
(d)Addedto a DRTR cache that resides on the ProxySG
Which appliance does not need any licensing and is fully operable after deployment?
Reporter creates reports that can be saved in the following formats (choose all that apply)
(a) CSV (comma-separated-values) to be opened by Excel
(b) Adobe PDF
(c) HTML
(d) XML
Which of the following statements are true? (Choose all that apply)
(a) Exceptions and notifications can be configured to use specific HTTP response codes.
(b) Exceptions and notify user objects can be created through the VPM.
(c) Exceptions and notify user objects can be utilized as action objects in the VPM.
(d) Exceptions and notify user objects can include substitutions such as the IP address, username or category.
Which of the following tracks client-server transactions going through the ProxySG?
HTTP/1.1 supports pipelining - multiple related requests are written to a single TCP socket without waiting for the responses to come back — i.e. the requests are done asynchronously in-parallel, instead of doing them sequentially as usual (see picture). Some Web clients such as Opera and Firefox with FasterFox plugin use HTTP pipelining. Assume that ProxySG Is deployed as a forward proxy listening on port 8080.
Which of the following console services are enabled by default? (Choose all that apply)
(a) HTTP port 8081
(b) HTTPS port 8082
(c) HTTPS port 8083
(d) SSH port 22
Which of the following policies CANNOT be implemented on the ProxyAV? (Choose all that apply)
(a) Blocking viruses, worms, spyware and trojans
(b) Blocking file types using apparent data type (file signature)
(c) Blocking files that exceed a size limit set by the administrator
(d) Blocking password protected archive files
What is true immediately after the initial setup of ProxySG?
ProxySG can provide all these services to IM clients — client authentication at a proxy, message reflection, policy enforcement and logging.
What are 'unmanaged endpoints" which make the ProxyRA appliance useful?
Which statements are true about the Blue Coat WebFilter? (Choose all that apply)
(a) A single web site can belong to multiple categories
(b) Embedded images and objects may be denied, even though the container page is allowed.
(c) WebFilter on-box database can be used in conjunction with a third party content database
(d) WebFilter on-box database updates are Web downloads
Which streaming services are supported by ProxySG?
HTTP Access log format bcreportermain_vl includes the time of the request, URL requested, and MIME type of content, but does not include whether it is cache hit or miss.
When the ProxySG 200's power LED indicator alternates between green and amber, it means that the system is booting.
The bcreportermain_vl access log format has a configurable ordering of fields, and this custom order is reflected in a log file header.
Which of the following statements are true about WCCP? (Choose all that apply)
(a) WCCP version 1 only redirects traffic based on TCP destination port 80 while WCCP version 2 can redirect more than just port 80.
(b) WCCP version 1 supports only single proxy while WCCP version 2 can support up to 32 proxies in a single service group.
(c) WCCP version 1 is the default version supported by ProxySG unless configured otherwise.
(d) WCCP version 2 is more suitable for multiple router deployment as it allows multicast discovery.
From where does the exception exception.user-defined.allinherit its properties?
On the ProxySG, can more than one authentication realm be active at any given time?
What is the purpose of the VPM-XML file?
In a TCP connection, what will a listener service attempt to match before deciding to intercept or to bypass the connection? (Choose all that apply)
(a) Source IP
(b) Destination IP
(c) Destination Port
(d) Source Port
Assume explicit proxy deployment where LDAP authentication realm is used. Authentication mode value is auto. What is the first response code that a client receives as it attempts to connect to the Internet for the first time?
In NTLM authentication, passwords are normally transmitted in which of these ways?
When a ProxySG processes an SSL transaction between a client and a content server, does the ProxySG function as an SSL client or as an SSL server?
A policy configured in VPM contains several Web Access layers, each contains several rules. Where a policy rule should be placed to ensure that it is always invoked and its action (e.g. ALLOW or DENY) is not overridden by any other rule?
Which of the following policy tasks require using the VPM and cannot be performed in CPL? (Select all that apply)
If the DRTR is enabled in real time, but does not have categorization value for the requested URL?
How does the Management Console perform commands on the ProxySG?
Which of the following types of traffic are scanned with ICAP RESPMOD?
Licensing of the Proxy AV is done through the ProxySG interface.
What are the two hardware chassis options that are available in Blue Coat Director? (Choose all that apply)
(a) SG210
(b) SG510
(c) SG800
(d) SG8100
The HTTP request from a client to a proxy uses addresses as shown in the picture. It follows that the ProxySG serves as transparent proxy.
Which of the following tasks could be performed from the Blue Coat Management Console? (Choose all that apply)
(a) SG Initial Setup
(b) Authentication Realm Configuration
(c) Bandwidth Class Configuration
(d) Resetting Trial Period