When will a policy trace report a rule processing result of "N/A"? (Choose the best answer.)
A. When the layer containing the rule is disabled
B. When the rule is not reached during evaluation
C. When the rule makes no sense for the specific transaction being processed
D. When the rule is contradicted by a subsequent rule
What is a component of a proxy service listener? (Choose the best answer.)
A. Encryption hash
B. Source IP address
C. Proxy mode
D. Proxy type
Which Symantec product is best suited for simultaneously administering a large number of ProxySG appliances? (Choose the best answer.)
A. PacketShaper
B. Reporter
C. Management Center
D. Content Analysis
Which section of a policy trace would an administrator locate the original HTTP GET request in? (Choose the best answer.)
A. Connection info
B. HTTP section
C. Policy decision
D. Header
Which two (2) files does the VPM update on the ProxySG when policy created in the VPM is installed? (Choose two.)
A. Local policy file
B. Central policy file
C. VPM-CPL file
D. Default policy file
E. VPM-XML file
What allows WebPulse to provide real-time revisions to the WebFilter database? (Choose the best answer.)
A. Dynamic categorization
B. Creating a local database
C. Threat risk levels
D. Configuring application controls
Which is responsible for detecting incoming traffic that matches specific IP addresses or subnets? (Choose the best answer.)
A. Listeners
B. Services
C. TCP tunnels
D. Proxies
What are the four principal policy checkpoints in the order they are reached, in a typical client HTTP request? (Choose the best answer.)
A. Client in, server out, server in, client out
B. Client in, server out, client out, server in
C. Client in, server in, client out, server out
D. Client in, server in, server out, client out
When can more than one authentication realm be active at any given time on the ProxySG? (Choose the best answer.)
A. Only in explicit mode
B. Never
C. Only in transparent mode
D. When policy is being evaluated
Which proxy service intercepts HTTPS traffic when browsers point directly to the ProxySG and Detect Protocol is enabled? (Choose the best answer.)
A. SSL
B. Explicit HTTP
C. HTTPS
D. TCP Tunnel