By default, what type of authentication challenge will the user-agent receive if the authentication node is set to AUTO?
A. proxy-ip for explicit and transparent clients
B. proxy for explicit and origin-cookie-redirect for transparent clients
C. proxy for explicit and transparent clients
D. proxy-ip for explicit and origin-ip-redirect for transparent clients
E. proxy for explicit and proxy-ip for transparent
Which of the following access log formats are supported by the ProxySG? (Choose all that apply)
(a)
ELFF
(b)
SQUID
(c)
Websense
(d)
NCSA
A.
a, b and c only
B.
a, b and d only
C.
a, c and d only
D.
b, c and d only
E.
All of the above
The ProxySG policy engine allows an administrator to create policy based on any MIME type, File Extension or File Signature (first bytes in the response body).
A. True
B. False
Which of the following is NOT true about global and per-rule policy tracing?
A. Each object processed by the ProxySG generates an entry in the global policy trace and appears in a rule-based trace if the object triggers a rule.
B. Global policy tracing may severely affect the performance of a production ProxySG.
C. You can enable global tracing through the Management Console or CLI.
D. You can enable per-rule tracing through the Management Console.
Which of the following Health Checks can be defined for a forwarding host? (Choose all that apply)
(a)
ICMP
(b)
TCP
(C)
HTTP
(d)
HTTPS
A.
a and b only
B.
b and c only
C.
c and d only
D.
a and d only
E.
All of the above
Log format variable rs(Content-Type) always refers to Content-type header value sent from the proxySG to the client.
A. True
B. False
When configuring Blue Coat Director, how can an administrator be authenticated? (Choose all that apply.)
(a)
Local configured accounts and password
(b)
RADIUS
(c)
IWA
(d)
TACACS+
A.
All of the above
B.
a, b and c only
C.
a, c and d only
D.
a, b and d only
Which of the following cashing techniques utilize retrieval workers to keep the contents of the cache fresh? (Choose all that apply.)
(a)
Cost-based Deletion
(b)
Asynchronous Adaptive Refresh
(c)
Popularity Contest
A.
a and b only
B.
b and c only
C.
All of the above
D.
b only
Which server certificate validation errors can be ignored within ProxySG policy? (Choose all that apply)
(a)
Untrusted issuer
(b)
Host name mismatch
(c)
Expiration
A.
a and b only
B.
b and c only
C.
a and c only
D.
All of the above
In which of the following ways can Access Logging be enabled? (Choose all that apply.)
(a)
By a CLI command
(b)
In the Management Console under Access Logging
(C)
By adding another layer to VPM policy
A.
a and b only
B.
a and c only
C.
b and c only
D.
All of the above
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Blue Coat exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your BCCPP exam preparations and Blue Coat certification application, do not hesitate to visit our Vcedump.com to find your solutions here.