New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium BlueCoat BCCPP Dumps Questions Answers

Page: 1 / 8
Total 211 questions

Blue Coat Certified Proxy Professional, V4.2 Questions and Answers

Question 1

The ProxySG policy engine allows an administrator to create policy based on any MIME type, File Extension or File Signature (first bytes in the response body).

Options:

A.

True

B.

False

Buy Now
Question 2

A service can be configured to listen in explicit and transparent mode simultaneously.

Options:

A.

True

B.

False

Question 3

Which header cannot be sent together with an HTTP 407 status code from the ProxySG?

Options:

A.

Proxy-Authenticate: Basic=”MyRealm”

B.

Proxy-Authenticate: NTLM=”MyRealm”

C.

Proxy- Authenticate: Kerberos=”MyRealm”

D.

proxy-Authenticate: Negotiate=”MyRealm”

E.

All the above headers can be sent with 407 status code

Question 4

In Kerberos authentication that uses BCAAA, which two entities negotiate the shared key that is used during the authentication? (Select 2)

Options:

A.

BCAAA

B.

The domain controller

C.

The client

D.

The origin content server

E.

The ProxySG

Question 5

By default, how often is the standard SSL trust package updated?

Options:

A.

Once every hour.

B.

Once every day.

C.

Once every seven days.

D.

Once every 30 days.

Question 6

When a downstream ProxySG requests an object that already is cached in an upstream ProxySG, the downstream ProxySG checks the object’s freshness with the origin content server.

Options:

A.

True

B.

False

Question 7

Can you simultaneously use policy created in the VPM and written in CPL?

Options:

A.

Yes

B.

No

Question 8

You can NOT use a self-signed certificate when intercepting SSL traffic.

Options:

A.

True

B.

False

Question 9

The ProxySG acts as both an ICAP client and ICAP server.

Options:

A.

True

B.

False

Question 10

Organize these CPL components into descending order based on how they are organized in policy.

Options:

A.

Triggers, conditions, rules, layers.

B.

Layers, conditions, rules, triggers.

C.

Layers, rules, conditions, triggers.

D.

Layers, rules, triggers, conditions.

Question 11

When creating a TCP tunnel service in explicit mode, you must also configure a forwarding host?

Options:

A.

True

B.

False

Question 12

NTLM credentials or Kerberos credentials: Which credentials typically require more trips between the ProxySG and the domain controller?

Options:

A.

NTLM credentials

B.

Kerberos credentials

Question 13

The bcreportermain_v1 access log format has a configurable ordering of fields, and this custom order is reflected in a log file header.

Options:

A.

True

B.

False

Question 14

Which policy file is processed last?

Options:

A.

Local policy file.

B.

Threat protection policy file.

C.

Forward policy file.

D.

Central policy file.

E.

The answer depends on the processing order configured in the Management Console.

Question 15

If a CPL rule contains more than one trigger, how are the triggers evaluated?

Options:

A.

Only the last trigger is evaluated.

B.

They are logically ORed together; any one of them must be true for the rule to match.

C.

They are logically ANDed together; all of them must be true for the rule to match.

D.

Only the first trigger is evaluated.

E.

The answer depends on the type of layer.

Question 16

Which of these are the features of a Blue Coat Director? (Choose all that apply)

(a) Install and update configurations of a group of ProxySG

(b) Distribute and control content of a group of ProxySG

(c) Managing SSL VPN configuration

(d) Monitoring ProxySG Performance

Options:

A.

a, b & c only

B.

a, b & d only

C.

b, c & d only

D.

a, c & d only

Question 17

When SGOS processes a client HTTP request, how many server workers are associated with each client worker?

Options:

A.

Zero or one, depending on whether the request is served from the SGOS object cache.

B.

One.

C.

Two.

D.

The answer varies depending on current ProxySG CPU utilization.

Question 18

Log format variable rs(Content-Type) always refers to Content-type header value sent from the proxySG to the client.

Options:

A.

True

B.

False

Question 19

When configuring reverse proxy with SSL, what are the 3 possible options of ensuring host affinity? (Choose all that apply)

(a) client-ip

(b) ssl-session-id

(c) accelerator-cookie

(d) server-ip

Options:

A.

All of the above

B.

b, c & d only

C.

a, c & d only

D.

a, b & c only

Question 20

When creating policy in the VPM, where can you instruct the ProxySG to enable or disable pipelining of referenced objects?

Options:

A.

In a Web Content layer.

B.

In a Cache Control layer.

C.

In a Web Access layer.

D.

You cannot do this in the VPM.

Question 21

Apparent Data Type objects can be created in the VPM for which of the following file types?

(Choose all that apply)

(a) Windows DLL

(b) Windows Exe

(c) Windows Ocx

(d) Windows Cab

Options:

A.

a, b & c only

B.

b, c & d only

C.

a, c & d only

D.

All of the above

Question 22

Which of the following statements are true? (Choose all that apply)

(a) The SGOS object store utilizes a directory structure so that objects in cache can be accessed rapidly

(b) Information about a single object in cache be retrieved from the Management console or the CLI

(c) There are two object caches, the object cache which resides on disk and the object cache which resides in RAM

(d) The SGOS object store is separated by protocol (HTTP cache, FTP cache, etc.)

Options:

A.

a, b & c only

B.

a, c & d only

C.

b, c & d only

D.

All of the above

Question 23

When a URL-based trigger is used in CPL, the compiler analyzes the source to determine the most efficient trigger to achieve the desired result.

Options:

A.

True

B.

False

Question 24

If cookie surrogates are used with a user agent that does not support cookies, how does the ProxySG respond?

Options:

A.

The ProxySG repeatedly tries to authenticate until the user agent gives up, and authentication is not successful.

B.

The ProxySG automatically switches to an IP surrogate and retries the authentication.

C.

The answer depends on whether any other user agents share the same IP address.

D.

This cannot happen; the ProxySG prevents such policy from being installed.

Question 25

In an SSL transaction in which the server’s certificate is not from a trusted authority, which entity generates the warning that is displayed in a web browser?

Options:

A.

The web browser.

B.

The server.

C.

The ProxySG.

D.

The answer depends on how the ProxySG has been configured.

Question 26

Which one of these regular expressions will match a URL that uses either HTTP or HTTPS?

Options:

A.

^https?

B.

2https?

C.

[http][https]

D.

http[s]

Question 27

What is the meaning of the metacharacter * (asterisk) in regular expressions?

Options:

A.

escape character

B.

any character except newline

C.

zero or character

D.

zero or more characters

Question 28

Log format variable s-ip always refers to

Options:

A.

IP address of the HTTP request client

B.

IP address of the original content server

C.

IP address of the ProxySG to which client has established a connection

Question 29

After creating CPL in the local policy file, the policy is imported into the VPM CPL file so that it can be viewed through the Visual Policy Manager.

Options:

A.

True

B.

False

Question 30

The authentication mode origin-ip-redirect allows an administrator to assign a Time To Live (TTL) for the surrogate credentials. Meanwhile the authentication mode origin-cookie-redirect does not provide this feature.

Options:

A.

True

B.

False

Question 31

For the above URL, will the trigger url.regex=!\.html$ match or miss?

Options:

A.

Match

B.

Miss

Page: 1 / 8
Total 211 questions