What type of filesystem does SGOS use?
A. ZFS
B. NTFS
C. FAT32
D. None of the above
When a downstream ProxySG requests an object that already is cached in an upstream ProxySG, the down- stream ProxySG checks the object's freshness with the origin content server.
A. True
B. False
If a user agent that does not support authentication tries to request content through a connection on which the ProxySG requires authentication, how can you best resolve the issue?
A. Identify the TCP ports used by the user agent, and create a proxy service to bypass such traffic.
B. Identify an HTTP header that identifies the user agent, and then write policy to exempt matching transactions from authentication.
C. Identify the IP address of the user agent, and then write policy to exempt matching transactions from authentication.
D. You cannot do this.
An HTTP request containing which header instructs the content server to return whether the requested ob- ject has been modified since the last visit?
A. Pragma: no-cache
B. GET If-Modified-Since
C. Cache-control: max-age
D. None of the above
SGOS is based on which other operating system?
A. VxWorks
B. pSOS
C. Unix
D. Windows
E. None of the above
When one ProxySG forwards HTTP requests to another ProxySG, does the originating ProxySG send a server-style GET request or a proxy-style GET request?
A. Server-style
B. Proxy-style
If the ProxySG and a client cannot successfully authenticate the use of Kerberos credentials during authen- tication in a realm where use of Kerberos credentials is enabled, what happens to the authentication re- quest?
A. The request automatically downgrades and tries to use Basic credentials.
B. The request automatically downgrades and tries to use NTLM credentials, and then Basic creden- tials.
C. The request fails.
Without asking a user or physically inspecting their computer, how can you determine which version of web browser they are using to make requests that are intercepted by the ProxySG? (Select all that apply)
A. By performing packet captures on the ProxySG when that web browser is in use.
B. By inspecting the ProxySG access log, if access logging is enabled.
C. By using the VPM realm browser.
D. You cannot do this.
In CPL, what is the difference between Deny and Force Deny?
A. Only one Force Deny can appear in any policy layer.
B. A later Allow can override a Force Deny.
C. Force Deny exists only in the VPM, not in CPL.
D. A Force Deny is final and cannot be reversed by subsequent policy processing.
Which policy file can be automatically updated when the ProxySG detects changes to an external source?
A. Threat protection policy file.
B. Central policy file.
C. Forward policy file.
D. Local policy file.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Blue Coat exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your BCCPP exam preparations and Blue Coat certification application, do not hesitate to visit our Vcedump.com to find your solutions here.