url.regex=!\.html$ d\ DENY
What is the effect of the above CPL code?
A. Deny any URL that ends with html
B. Deny any URL that does not end with html
C. Deny any URL that ends with htm or html
D. Deny any URL that does not end with htm or html
When creating a TCP tunnel service in explicit mode, you must also configure a forwarding host?
A. True
B. False
Which of the following is NOT true about global and per-rule policy tracing?
A. Each object processed by the ProxySG generates an entry in the global policy trace and appears in a rule-based trace if the object triggers a rule.
B. Global policy tracing may severely affect the performance of a production ProxySG.
C. You can enable global tracing through the Management Console or CLI.
D. You can enable per-rule tracing through the Management Console.
What is the meaning of the metacharacter? (question mark) in regular expressions?
A. escape character
B. any character except newline
C. zero or one character
D. zero or more characters
What is a precondition for using L2 MAC rewrite with WCCP?
A. The LAN where WCCP router and ProxySG are located should use IPv6
B. No forwarding should be defined for ProxySG
C. ProxySG and router should be in the same broadcast domain
When SGOS processes a client HTTP request, how many server workers are associated with each client worker?
A. Zero or one, depending on whether the request is served from the SGOS object cache.
B. One.
C. Two.
D. The answer varies depending on current ProxySG CPU utilization.
When creating a policy-driven trace, which CPL property specifies the name of the policy trace file into which matching transactions are traced?
A. trace.destination()
B. trace.request()
C. trace.rules()
D. None of the above
Perl statements can be included into CPL code as part of policy processing.
A. True
B. False
In which two of these cases must you specify a virtual URL to be used in conjunction with Kerberos au- thentication? (Select 2)
A. Transparent proxy connection
B. A redirect authentication mode
C. Explicit proxy connection
D. A cookie authentication mode
E. An origin authentication mode
Which policy file is processed first?
A. Central policy file.
B. Forward policy file.
C. Local policy file.
D. Threat protection policy file.
E. The answer depends on the processing order configured in the Management Console.