What is a component of a proxy service listener? (Choose the best answer.)
In which caching technique are objects that require more server-side bandwidth and response time less likely to be deleted from the cache? (Choose the best answer.)
Which two (2) methods are able to be used to regain access to the setup console if an administrator loses the password? (Choose two.)
Which two (2) locations is the WebFilter database stored in? (Choose two.)
How does a network administrator access sysinfo files? (Choose the best answer.)
Which section of the sysinfo file would an administrator examine to see how specific components are behaving? (Choose the best answer.)
What must the virtual URL point to, when the ProxySG utilizes a virtual URL for user authentication in a transparent deployment? (Choose the best answer.)
When will a policy trace report a rule processing result of “N/A”? (Choose the best answer.)
How does an administrator create a single group in policy that includes multiple client addresses? (Choose the best answer.)