The ProxySG policy engine allows an administrator to create policy based on any MIME type, File Extension or File Signature (first bytes in the response body).
A service can be configured to listen in explicit and transparent mode simultaneously.
Which header cannot be sent together with an HTTP 407 status code from the ProxySG?
In Kerberos authentication that uses BCAAA, which two entities negotiate the shared key that is used during the authentication? (Select 2)
By default, how often is the standard SSL trust package updated?
When a downstream ProxySG requests an object that already is cached in an upstream ProxySG, the downstream ProxySG checks the object’s freshness with the origin content server.
Can you simultaneously use policy created in the VPM and written in CPL?
You can NOT use a self-signed certificate when intercepting SSL traffic.
The ProxySG acts as both an ICAP client and ICAP server.
Organize these CPL components into descending order based on how they are organized in policy.
When creating a TCP tunnel service in explicit mode, you must also configure a forwarding host?
NTLM credentials or Kerberos credentials: Which credentials typically require more trips between the ProxySG and the domain controller?
The bcreportermain_v1 access log format has a configurable ordering of fields, and this custom order is reflected in a log file header.
Which policy file is processed last?
If a CPL rule contains more than one trigger, how are the triggers evaluated?
Which of these are the features of a Blue Coat Director? (Choose all that apply)
(a) Install and update configurations of a group of ProxySG
(b) Distribute and control content of a group of ProxySG
(c) Managing SSL VPN configuration
(d) Monitoring ProxySG Performance
When SGOS processes a client HTTP request, how many server workers are associated with each client worker?
Log format variable rs(Content-Type) always refers to Content-type header value sent from the proxySG to the client.
When configuring reverse proxy with SSL, what are the 3 possible options of ensuring host affinity? (Choose all that apply)
(a) client-ip
(b) ssl-session-id
(c) accelerator-cookie
(d) server-ip
When creating policy in the VPM, where can you instruct the ProxySG to enable or disable pipelining of referenced objects?
Apparent Data Type objects can be created in the VPM for which of the following file types?
(Choose all that apply)
(a) Windows DLL
(b) Windows Exe
(c) Windows Ocx
(d) Windows Cab
Which of the following statements are true? (Choose all that apply)
(a) The SGOS object store utilizes a directory structure so that objects in cache can be accessed rapidly
(b) Information about a single object in cache be retrieved from the Management console or the CLI
(c) There are two object caches, the object cache which resides on disk and the object cache which resides in RAM
(d) The SGOS object store is separated by protocol (HTTP cache, FTP cache, etc.)
When a URL-based trigger is used in CPL, the compiler analyzes the source to determine the most efficient trigger to achieve the desired result.
If cookie surrogates are used with a user agent that does not support cookies, how does the ProxySG respond?
In an SSL transaction in which the server’s certificate is not from a trusted authority, which entity generates the warning that is displayed in a web browser?
Which one of these regular expressions will match a URL that uses either HTTP or HTTPS?
What is the meaning of the metacharacter * (asterisk) in regular expressions?
Log format variable s-ip always refers to
After creating CPL in the local policy file, the policy is imported into the VPM CPL file so that it can be viewed through the Visual Policy Manager.
The authentication mode origin-ip-redirect allows an administrator to assign a Time To Live (TTL) for the surrogate credentials. Meanwhile the authentication mode origin-cookie-redirect does not provide this feature.
For the above URL, will the trigger url.regex=!\.html$ match or miss?