In which type of physical deployment does a ProxySG have potential visibility to all traffic through the use of a device such as a WCCP-capable router or a Layer 4 switch?
A. Transparent
B. None of these answers
C. Explicit
D. Virtually Inline
Which Symantec product is best suited for simultaneously administering a large number of ProxySG appliances?
A. Reporter
B. PacketShaper
C. Content Analysis
D. Management Center
Why is Kerberos performance better than NTLM?
A. It uses less encryption
B. None of these answers
C. Only two round trips are required between the browser and an authentication server
D. It works with later versions of Microsoft Windows
What does the authentication mode specify?
A. The time-to-live for credentials
B. The protocol used to communicate with the authentication service
C. The challenge type and the accepted surrogate
D. Whether the credentials will be encrypted
Which of the following is not a VPM trigger object?
A. Time
B. Source
C. Destination
D. Service
E. Action
If you have configured continuous uploading of access logs and the ProxySG is unable to reach the upload destination, what happens to the log entries?
A. They are uploaded in real time to the backup upload destination configured in the Management Console
B. None of these answers
C. They are stored locally until the connection is re-established, and then they are uploaded
D. They are discarded
A local database can be used as an alternative of what?
A. The ProxySG does not support local databases
B. Either an on-box or off-box database
C. An off-box WebFilter database only
D. An on-box database only
Which of the following are common elements of a GET request? (Choose three.)
A. The protocol version
B. The MAC address of the client user agent
C. A resource
D. A method
Which of the following is NOT a component of a proxy service listener?
A. Source IP address
B. Port range
C. Destination IP address
D. Proxy type
In which client connection type are user agents aware that a proxy has been deployed?
A. Explicit proxy
B. In every connection type
C. Inline
D. Transparent
Of the methods that the ProxySG uses to detect file type, which one is usually the most accurate?
A. Checking the HTTP content type (or MIME type)
B. Performing an anti-virus scan
C. Detecting apparent data type D. Checking the file extension
Which one of these statements best describes how policy checkpoints evaluate the installed policy on a ProxySG?
A. The Server In checkpoint decides which rules will be evaluated by the other checkpoints
B. The Client In checkpoint decides which rules will be evaluated by the other checkpoints
C. At each checkpoint, a decision is made whether to allow or deny the transaction
D. Relevant rules are evaluated at each checkpoint based on the information about the transaction that is available at that point
What is typically the biggest load on CPU?
A. MD5
B. Emulating certificates
C. Using RSA
D. SHA-2
What can you use to specify which traffic should be encrypted?
A. The SSL Proxy
B. Listeners
C. All proxy services
D. Categories