What do you need to enable NTLM authentication?
A. Active directory server and authentication license
B. BCAAA and authentication license
C. BCAAA
By looking at the above HTTP GET request, what are the possible proxySG deployment methods that could be in used? (Choose all that apply)
(a)
Default Route
(b)
WCCP
(c)
PAC
(d)
WPAD
A.
a, d only
B.
c, d only
C.
b, c only
D.
None of the above
What configuration of ProxySG can be created during web initial setup wizard? (Choose all that apply)
(a)
IP address or addresses, mask, gateway, DNS address or addresses (b) and settings and manager and backup manager
(c)
password for web management Console and CLI enabled mode.
A.
A, B only
B.
A, C only
C.
B, C only
D.
All of the above
Which of the following categorization method incur additional costs (not covered by ProxySG and BCWF licenses)?
A. Local Database Categorization
B. IWF Categorization
C. SurfControl Categorization
D. DRTR Categorization
How many content filtering databases can be used in a policy for SGOS 5.3 at the same time (apart from the local database and IWF restricted categories)?
A. Only one content filtering database
B. Any two content filtering databases
C. Two content filtering databases -- BCWF and one other
D. Any number of content filtering databases from the list supported by ProxySG
Which is NOT a good reason to configure user authentication when deploying ProxySG as an Internet gateway proxy?
A. To allow creation of granular polices by user or group
B. To allow more detailed logging and reports
C. To enable more convincing coaching pages for AUP violations
D. To ensure that cache content is not expired
E. To protect against unauthorized access of Web objects found in cache
Name two different ways to create a transparent proxy environment.
A. Using the PAC File or configuring WCCP
B. Configuring a Layer 4 switch or configuring the appliance in bridging mode
C. Configuring WCCP or using an automatic configuration script
In a TCP connection, what will a listener service attempt to match before deciding to intercept or to bypass the connection? (Choose all that apply)
(a)
Source IP
(b)
Destination IP
(c)
Destination Port
(d)
Source Port
A.
a and b only
B.
b and c only
C.
c and d only
D.
All of the above
ProxySG uses a licensed Blue Coat Web Filter (BCWF), and has configured policies for URL categories. ProxySG uses a DNS server, which for some reason cannot resolve the domain name sp.cwfservice.net anymore. What happens to the content filtering policy evaluation in this case?
A. Any time when policy evaluation needs to categorize an URL, access to that page is denied.
B. ProxySG always uses whatever action is configured for the System/unavailable category
C. Policy evaluation is not affected, because ProxySG uses the default IP address of a WebPulse Service Point
D. Policy evaluation is not affected for URLs categorized in the BCWF database, and is evaluated as System/unavailable for any other URLS.
Which of the following types of traffic are scanned with ICAP RESPMOD?
A. HTTP responses
B. FTP uploads
C. HTTP PUT data
D. HTTP POST data
E. All of the above
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Blue Coat exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your BCCPA exam preparations and Blue Coat certification application, do not hesitate to visit our Vcedump.com to find your solutions here.