When will a policy trace report a rule processing result of "N/A"? (Choose the best answer.)
A. When the layer containing the rule is disabled
B. When the rule is not reached during evaluation
C. When the rule makes no sense for the specific transaction being processed
D. When the rule is contradicted by a subsequent rule
Which two (2) categories of traffic are typically left encrypted? (Choose two.)
A. Gambling
B. News Media
C. Social Media
D. Financial Services
E. Health
Which log format is associated with the main log facility by default? (Choose the best answer.)
A. http
B. elff
C. main
D. bcreportermain_v1
How does the ProxySG handle a rule that contains a syntax error when the ProxySG processes installed policy as part of a client transaction? (Choose the best answer.)
A. The ProxySG changes the transaction status to Deny and makes an entry in the event log
B. The ProxySG stops processing of the layer containing the rule and continues with the next layer, if any
C. This is NOT possible; rules with syntax errors are unable to be installed.
D. The ProxySG skips the rule and does NOT change the accept or deny status of the transaction
In which caching technique are objects that require more server-side bandwidth and response time less likely to be deleted from the cache? (Choose the best answer.)
A. Round robin
B. Cost-based deletion
C. Popularity contest
D. Asynchronous adaptive refresh
Which two (2) items are considered external dependencies? (Choose two.)
A. Policy
B. DNS
C. CPU
D. Authentication
E. Memory
Which SGOS edition is designed for Secure Web Gateway hardware deployments? (Choose the best answer.)
A. Proxy Edition
B. Premium Edition
C. MACH5 Edition
D. Basic Edition
Which two (2) environments will IP surrogate credentials NOT work in? (Choose two.)
A. With devices that use Network Address Translation
B. Out-of-path deployments
C. Transparent deployments
D. Explicit deployments
E. Multi-user environments such as Citrix
What are two (2) methods by which the ProxySG can detect the type of a file that is downloaded? (Choose two.)
A. Checking the HTTP cache
B. Performing an anti-virus scan
C. Checking the file extension
D. Submitting the URL to WebPulse
E. Detecting apparent data type
Which VPM layer can be most commonly used to control decrypting of SSL traffic by authenticated username? (Choose the best answer.)
A. SSL Authentication layer
B. Web Authentication layer
C. SSL Intercept layer
D. None of these answers