In which type of physical deployment does a ProxySG have potential visibility to all traffic through the use of a device such as a WCCP-capable router or a Layer 4 switch?
A. Transparent
B. None of these answers
C. Explicit
D. Virtually Inline
Which Symantec product is best suited for simultaneously administering a large number of ProxySG appliances?
A. Reporter
B. PacketShaper
C. Content Analysis
D. Management Center
What stops further rule processing in a layer?
A. When the final rule on the layer is reached
B. When two rules match
C. When a later rule contradicts an earlier rule
D. The first rule in the layer that matches
Why is Kerberos performance better than NTLM?
A. It uses less encryption
B. None of these answers
C. Only two round trips are required between the browser and an authentication server
D. It works with later versions of Microsoft Windows
Which services are included in the Intelligence Services Advanced Bundle?
A. Content categories
B. Threat risk levels
C. All of these
D. Geolocation
What Symantec product allows you to go back in time to identify the root cause of an infection or compromise?
A. Security Analytics
B. Management Center
C. Reporter
D. Content Analysis
Which SGOS edition is designed for Secure Web Gateway deployments?
A. Premium Edition
B. MACH5 edition
C. SWG Edition
D. Proxy Edition
In which client connection type are user agents aware that a proxy has been deployed?
A. Explicit proxy
B. In every connection type
C. Inline
D. Transparent
What is typically the biggest load on CPU?
A. MD5
B. Emulating certificates
C. Using RSA
D. SHA-2
What happens when the ProxySG bypasses traffic?
A. No policy can be applied
B. Only the default policy can be applied
C. The traffic is blocked
D. An exception message is displayed to the user