Which two (2) categories of traffic are typically left encrypted? (Choose two.)
A. Gambling
B. News Media
C. Social Media
D. Financial Services
E. Health
In which caching technique does the ProxySG open multiple server connections to retrieve objects referenced on a web page before the client actually issues the requests for those objects? (Choose the best answer.)
A. Popularity contest
B. Cost-based deletion
C. Asynchronous adaptive refresh
D. Pipelining
How can an administrator determine the serial number of the ProxySG in the Management Console? (Choose the best answer.)
A. This information is not visible from the Management Console
B. Go to Statistics > Advanced
C. Go to Configuration > Network
D. The serial number is contained in the top right Management Console banner
Which kind of authentication credentials might Schannel congestion in IWA direct realms be an issue with? (Choose the best answer.)
A. NTLM
B. Surrogate credentials
C. Kerberos
D. Basic
What does it mean if WebPulse returns a URL category of "Pending"? (Choose the best answer.)
A. The URL has NOT been categorized by WebFilter
B. Background categorization is being performed in WebPulse
C. An exception is being sent to the client
D. The ProxySG waits before applying policy to the request
How does an administrator view policy coverage statistics? (Choose the best answer.)
A. View the Policy Coverage statistics section of the sysinfo.
B. Use an advanced URL.
C. Create a dedicated layer in the VPM.
D. Use a global policy trace.
Where does the ProxySG get the text of the exception page, when it sends an exception page to a client? (Choose the best answer.)
A. From the VPM-XML file
B. From WebPulse
C. From the exception definition stored on the ProxySG
D. From Symantec Technical Support
How does a server know where to retrieve the requested information when it receives a GET request method? (Choose the best answer.)
A. The server examines the certificate of the requesting IP address
B. The URL is in the GET request
C. The server retrieves it from the server cache
D. The server must return a response message requesting the URL
What is the primary benefit of using Integrated Windows Authentication (IWA) authentication realms? (Choose the best answer.)
A. Single sign-on experience for users
B. Better performance by using NTLM credentials
C. Ability to use Kerberos credentials
D. Greater security than LDAP
Which two (2) methods are able to be used to regain access to the setup console if an administrator loses the password? (Choose two.)
A. Access the ProxySG from another ProxySG
B. Open a serial connection, and use the CLI command restore-defaults factory-defaults
C. Use Management Center to access the setup console
D. Use the front panel buttons and screen, if available on this model, to reset the password
E. Press Control + ALT + DEL
Which diagnostic tool allows an administrator to examine how the ProxySG has applied policy to a particular request? (Choose the best answer.)
A. Policy/Statistics
B. Policy monitor
C. Policy tracing
D. Packet capture
What are the building blocks of conditions when building policies in CPL? (Choose the best answer.)
A. Triggers
B. Properties
C. Rules
D. Layers
Which section of the sysinfo file displays information such as the number of successes and failures? (Choose the best answer.)
A. System state statistics
B. Logs
C. Snapshots
D. Health check statistics
Which section of the sysinfo file would an administrator examine to see how specific components are behaving? (Choose the best answer.)
A. Configuration
B. Logs
C. System state
D. Statistics
When are software workers created during an interaction between a ProxySG and a client requesting a webpage? (Choose the best answer.)
A. At the ProxySG's initial configuration
B. When SGOS receives a connection request
C. When the ProxySG first boots up
D. When a transaction request must be fulfilled from the Internet rather than from the cache