What stops further rule processing in a layer?

What stops further rule processing in a layer?A . When the final rule on the layer is reachedB . When two rules matchC . When a later rule contradicts an earlier ruleD . The first rule in the layer that matchesView AnswerAnswer: D Explanation: Reference: https://origin-symwisedownload.symantec.com/resources/webguides/sgos/policy/Learn/ aboutlayerandruleeval/layerguards.htm

September 27, 2019 No Comments READ MORE +

A newly-shipped physical ProxySG contains what type of license?

A newly-shipped physical ProxySG contains what type of license?A . TrialB . DemoC . PermanentD . ProvisionalView AnswerAnswer: A Explanation: Reference: https://origin-symwisedownload.symantec.com/resources/webguides/proxysg/6.2/ acceleration_webguide/Content/02Tasks/Maintenance/view_license_information_ta.htm

September 20, 2019 No Comments READ MORE +

When the ProxySG uses a virtual URL for user authentication, what must the virtual URL point to?

When the ProxySG uses a virtual URL for user authentication, what must the virtual URL point to?A . The IP address of the origin content serverB . A hostname that the user agent can DNS-resolve to an IP addressC . None of these answersD . The IP address of the...

September 14, 2019 No Comments READ MORE +

Why is Kerberos performance better than NTLM?

Why is Kerberos performance better than NTLM?A . It uses less encryptionB . None of these answersC . Only two round trips are required between the browser and an authentication serverD . It works with later versions of Microsoft WindowsView AnswerAnswer: B Explanation: Reference: https://origin-symwisedownload.symantec.com/resources/webguides/proxysg/certification/ authentication_webguide/Content/Topics/Authentication/Concepts/IWA_auth_protocols_co.htm

September 12, 2019 No Comments READ MORE +

What can proxy servers do? (Choose three.)

What can proxy servers do? (Choose three.)A . Rewrite request messagesB . Interpret request messagesC . Block malicious contentD . Scan traffic for virusesView AnswerAnswer: ACD Explanation: Reference: https://origin-symwisedownload.symantec.com/resources/webguides/proxysg/ security_first_steps/Content/PDFs/Malware_Prevention_Solution.pdf

September 11, 2019 No Comments READ MORE +

Which type of authentication realm does not require communication with an external authentication server?

Which type of authentication realm does not require communication with an external authentication server?A . IWA realmB . Kerberos realmC . Local realmView AnswerAnswer: C

September 7, 2019 No Comments READ MORE +

By default, HTTP traffic that is logged is recorded to which log facility?

By default, HTTP traffic that is logged is recorded to which log facility?A . bcreportermain_v1B . mainC . elfD . httpView AnswerAnswer: B Explanation: Reference: https://wikileaks.org/spyfiles/files/0/241_BLUECOAT-SGOS_CMG_5.1.4_9.pdf (p.7)

September 4, 2019 No Comments READ MORE +

What does the authentication mode specify?

What does the authentication mode specify?A . The time-to-live for credentialsB . The protocol used to communicate with the authentication serviceC . The challenge type and the accepted surrogateD . Whether the credentials will be encryptedView AnswerAnswer: C

August 27, 2019 No Comments READ MORE +

On the ProxySG, can more than one authentication realm be active at any given time?

On the ProxySG, can more than one authentication realm be active at any given time?A . NoB . YesC . Only in explicit modeD . Only in transparent modeView AnswerAnswer: B

August 23, 2019 No Comments READ MORE +

Which is the default TCP port for HTTP?

Which is the default TCP port for HTTP?A . 20B . 80C . 443D . 43View AnswerAnswer: B Explanation: Reference: https://support.symantec.com/en_US/article.TECH242551.html

August 18, 2019 No Comments READ MORE +