What stops further rule processing in a layer?A . When the final rule on the layer is reachedB . When two rules matchC . When a later rule contradicts an earlier ruleD . The first rule in the layer that matches View Answer Answer: D Explanation: Reference: https://origin-symwisedownload.symantec.com/resources/webguides/sgos/policy/Learn/ aboutlayerandruleeval/layerguards.htm...
Continue readingA newly-shipped physical ProxySG contains what type of license?
A newly-shipped physical ProxySG contains what type of license?A . TrialB . DemoC . PermanentD . Provisional View Answer Answer: A Explanation: Reference: https://origin-symwisedownload.symantec.com/resources/webguides/proxysg/6.2/ acceleration_webguide/Content/02Tasks/Maintenance/view_license_information_ta.htm...
Continue readingWhen the ProxySG uses a virtual URL for user authentication, what must the virtual URL point to?
When the ProxySG uses a virtual URL for user authentication, what must the virtual URL point to?A . The IP address of the origin content serverB . A hostname that the user agent can DNS-resolve to an IP addressC . None of these answersD . The IP address of the ProxySG View Answer Answer:...
Continue readingWhy is Kerberos performance better than NTLM?
Why is Kerberos performance better than NTLM?A . It uses less encryptionB . None of these answersC . Only two round trips are required between the browser and an authentication serverD . It works with later versions of Microsoft Windows View Answer Answer: B Explanation: Reference: https://origin-symwisedownload.symantec.com/resources/webguides/proxysg/certification/ authentication_webguide/Content/Topics/Authentication/Concepts/IWA_auth_protocols_co.htm...
Continue readingWhat can proxy servers do? (Choose three.)
What can proxy servers do? (Choose three.)A . Rewrite request messagesB . Interpret request messagesC . Block malicious contentD . Scan traffic for viruses View Answer Answer: ACD Explanation: Reference: https://origin-symwisedownload.symantec.com/resources/webguides/proxysg/ security_first_steps/Content/PDFs/Malware_Prevention_Solution.pdf...
Continue readingWhich type of authentication realm does not require communication with an external authentication server?
Which type of authentication realm does not require communication with an external authentication server?A . IWA realmB . Kerberos realmC . Local realm View Answer Answer: C...
Continue readingBy default, HTTP traffic that is logged is recorded to which log facility?
By default, HTTP traffic that is logged is recorded to which log facility?A . bcreportermain_v1B . mainC . elfD . http View Answer Answer: B Explanation: Reference: https://wikileaks.org/spyfiles/files/0/241_BLUECOAT-SGOS_CMG_5.1.4_9.pdf (p.7)...
Continue readingWhat does the authentication mode specify?
What does the authentication mode specify?A . The time-to-live for credentialsB . The protocol used to communicate with the authentication serviceC . The challenge type and the accepted surrogateD . Whether the credentials will be encrypted View Answer Answer: C...
Continue readingOn the ProxySG, can more than one authentication realm be active at any given time?
On the ProxySG, can more than one authentication realm be active at any given time?A . NoB . YesC . Only in explicit modeD . Only in transparent mode View Answer Answer: B...
Continue readingWhich is the default TCP port for HTTP?
Which is the default TCP port for HTTP?A . 20B . 80C . 443D . 43 View Answer Answer: B Explanation: Reference: https://support.symantec.com/en_US/article.TECH242551.html...
Continue reading