Which file type is created when saving a traffic tree with the command: config save myshaper?
A. LDIF
B. A file in a custom binary format
C. HTML
D. XML
What partitions could an administrator apply to a class in the Sky UI?
A. You can apply any supported partitions and policies from the Sky UI
B. You can apply any supported partition from the Sky UI, but you must apply policies from the Advanced UI
C. You cannot apply them from the Sky Ul, you must use the Advanced UI to apply policies and partitions
D. You can apply static or dynamic partitions, but not burstable ones from the Sky UI
Why would an administrator configure the failover feature in PacketShaper Guided Setup?
A. To enforce policies to react to a new link speed when the primary WAN link fails
B. To configure advanced system settings, such as Packet Engine, auto discovery, and dynamic partitions
C. To configure PacketShaper for use with WCCP when the primary WAN link fails
D. To schedule commands to execute at a specific time or on a recurring basis
What are the main two functional modules within the PacketShaper?
A. Shaping module and Monitoring module
B. Shaping module and Policy module
C. Compression module and Acceleration module
D. Monitoring module and Caching module
Which statement about dynamic partitions is true?
A. All fixed partitions are converted to dynamic as users become active in a traffic class
B. They can only be configured for the aggregate traffic class
C. Child class partitions, automatically convert the parent class into dynamic partitions
D. The minimum subpartition size is 1024 bps
Which two (2) tasks does response time measurement (RTM) allow an administrator to perform? (Select two)
A. Measure the quality of users' network experience
B. Examine host, performance and CPU statistics
C. Measure the quality of packet exchange times
D. Measure the number of times traffic flows match a class
E. Examine performance statistics and performance graphs
Which option does Symantec recommend to A. Precise management of TCP traffic, but not IP traffic B. Prease management of UDP traffic only C. Rate priorities for TCP traffic D. Management of TCP and UDP traffic, but not non-IP traffic
An administrator suspects that the primary Blue Coat Authentication and Authorization Agent (BCAAA)
server has stopped functioning. When checking the status of User Awareness on the Setup > User
Awareness page, the status message "In use" is displayed on the page.
What does the status "in use" mean?
A. The server is up. PadwtShaper has connected to the server and can look up users.
B. The server is busy. PacketShaper can't connect to It until it is freed up.
C. You configured the wrong IP address of the BCAA server on the PackefShaper. PacketShaper c3nl connect to the server.
D. The server is up. PacketShaper can connect to this server, but is using an alternate BCAAA server on your network.
What does the "setup reset cleat" command enforce, that the "setup reset all* command does NOT?
A. It dears all files on the "/public" folder, ME data, and RAD1US/IACACS* information
B. It restores measurement data files to the measurement directory
C. It discards the current configuration and resumes operation using the loaded configuration files
D. It sets the appliance's management IP address to 10.10.10.1
What do instances of bold text in the PacfcetShapet Wffie lice represent?
A. Default Policy
B. Policy that n actively being used
C. Policy that was changed during the current session D. Inheritable Policy
A PacketSHaper is installed between the VPN Gateway and Internet i outer at the main site of a company's
network A server at the main site is hosting business critical applications. A local ionbased traffic tree has
been created which classifies traffic coming from three remote sites by subnet.
All traffic between the remote sites and the central sue is encrypted.
Which two (2) useful pieces of data can the PacketShaper provide in this scenario? (Select two)
A. Bandwidth utilization of each individual application
B. Bandwidth utilization of the total encrypted VPN traffic
C. lop talkers and Top Listeners at the remote site
D. Bandwidth utilization of each individual remote site
E. Subnets or host lists of location-based classes
Refer to the exhibit.
The Global Intelligence Network Of WebPulse service classifies .1 website as "Entertainment;
Mumor/tokes." The current configuration of PacketShaper has traffic discovery enabled within the Inbound/
HTTP class and has the class tree shown as in the exhibit with WebPulse enabled.
What two (2) classes will the traffic flow into when the client makes a request to the website in question?
(Select two)
A. Inbound/Local host
B. inbound/Entertainment
C. Inbound/HTTP/Default
D. Inbound/HTTP/Entertainment
E. Inbound/Humor_jotes
A network administrator is interested in protecting VoIP traffic on the network.
How can the administrator best accomplish this while maintaining visibility into overall VoIP bandwidth
utilization'
A. An administrator is unable to monitor and protect All VoIP traffic at once using a PacketShaper
B. Create a class based on the IP addresses of the IP phones so that all traffic between them can be measured and controlled
C. Use PacketShaper's Flow Detail Record (FDR) feature to have the PacketShaper export VoIP flow data to ReportCenter
D. Create a folder with a guaranteed minimum sue partition and move all of the VoIP related classes into the folder
How is a traffic How classified when it does NOT match any of the classes in the traffic tree?
A. As Localhost
B. As Default
C. As Sameside traffic
D. As HTTP unknown
Refer to the traffic tree in the exhibit.
Which policy does the PacketShaper apply to London HTTP traffic?
A. Priority (0)
B. Priority (3)
C. Rate (2) ok
D. Priority (6)