What are the possible configurable options when configuring destination address in proxy services? (Choose all that apply)
(a)
All
(b)
Any
(c)
Explicit
(d)
Transparent
A.
a, c and d only
B.
a, b and c only
C.
b, c andd only
D.
All of the above
A ProxySG is designed to do which of the following? (Choose all that apply)
(a)
Enhance security through authentication, virus scanning, and logging. (b) Increase performance through TCP optimization, HTTP caching and pipelining. (c) Control content with URL filtering, content stripping, and HTTP header analysis.
A.
a and b only
B.
b and c only
C.
a and c only
D.
All of the above
Which of the following tracks client-server requests and server responses?
A. Event logs
B. Sys logs
C. Report logs D. Access logs
The ProxySG can create configurable access logs for FTP, HTTP, and Telnet but not for Peer-to-Peer or Real Media
A. True
B. False
Which of the following are true about the rules processing in the VPM? (Choose all that apply)
(a)
Rules are processed in a top down sequence.
(b)
Layers are processed from left to right regardless of type.
(c)
Layers are processed according to layer type.
(d)
Layers of the same type are processed from left to right.
A.
None of the above
B.
b. c and d only
C.
a, b and c only
D.
a, c and d only
The placeholder variables that are available in ProxyClient's exception templates (i.e. the screens that are displayed, when there is a policy violation) are the same ones that are available for user-defined exceptions within ProxySG.
A. True
B. False
Which HTTP error code corresponds to the ProxySG default exception identifier authentication failed?
A. 403
B. 404
C. 503
D. 401
The ProxySG allows you to upload compressed access logs or plain-text access logs.
A. True
B. False
Persistent TCP connections are enabled by default starting with which version of HTTP?
A. 1.1
B. 0.9
C. 1.0
D. None of the above