What is the behavior of content filtering policies, when the Blue Coat WebFilter license expires?
A. All content is blocked
B. All content is allowed
C. Content is allowed or blocked depending on policy for System/unlicensed D. Content is allowed or blocked depending on fail open or fail closed setting in Management Console.
What categories are included in Blue Coat WebFilter on-box database and recognized by the WebPulse dynamic categorization?
A. There is a simple list of 23 categories
B. There is a hierarchy of 36 first level categories, and several hundred second level categories
C. There is a simple list of 69 categories
How can a user restore ProxySG back to its default, factory settings, so that its IP address etc. needs to be configured anew? (Choose all that apply)
(a)
Press a button on ProxySG back panel (left arrow on front panel for some models) and hold it for about 5 seconds
(b)
Enter a CLI command ( restore-defaults factory-defaults ) and confirm it with y(yes) . (c) Press a button in Management Console that drops the network configuration, and confirm the warning dialog.
A.
a and b only
B.
a and c only
C.
b and c only
D.
All of the above
Notify user objects utilize cookies and http redirection to deliver error messages to clients.
A. True
B. False
Which of the following are trigger objects in the Visual Policy Management? (Choose all that apply)
(a)
Source Address
(b)
Destination Address
(c)
Time
(d)
Tracking
A.
All of the above
B.
b, c and d only
C.
a, b and c only
D.
a, c a d only
What is sent over HTTP, if user enters non-ASCII characters into the address window of a Web browser
(e.g.
the URL address shown in the image)?
A.
The UTF-16 representation of these characters is being sent, since HTTP supports Unicode
B.
The special characters are Base64 encoded before sending
C.
URL address contains sequence of the form %HH%HH%HH, where "HH" is a hex-encoding of bytes representing the non-ASCII characters
D.
Special characters are sent as bytes, using the current encoding of the Web page
You can obtain support information without contacting anyone from Blue Coat support via Blue Coat's online tool, Instant Support.
A. True
B. False
Which of the following is true about enabling access logging? (Choose all that apply)
(a)
Access logging is disabled by default on newly configured systems. (b) You can enable access logging through the Management Console only. (c) You must configure the ProxySG to intercept protocols you wish to log.
A.
a and b only
B.
a and c only
C.
b and c only
D.
All of the above
ICAP responses may be cached on a ProxySG, i.e. for some Web requests ICAP processing may be completed without involving ProxyAV?
A. True
B. False
A policy configured in VPM contains several Web Access layers, each contains several rules. Where a policy rule should be placed to ensure that it is always invoked and its action (e.g. ALLOW or DENY) is not overridden by any other rule?
A. First in the first layer
B. First in the last layer
C. Last in the first layer
D. Last in the last layer
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Blue Coat exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your BCCPA exam preparations and Blue Coat certification application, do not hesitate to visit our Vcedump.com to find your solutions here.