Where is the WebFilter database stored? (Choose two.)
A. On clients' mobile devices
B. On a properly licensed ProxySG
C. At several data centers around the world
D. At third-party data centers
When does the ProxySG establish an Schannel?
A. When a client request is first received
B. When the client sends an NTLM type 2 message to ProxySG
C. When IWA authentication fails
D. When the client sends an NTLM type 3 message to the ProxySG
Which of the following is not a VPM trigger object?
A. Time
B. Source
C. Destination
D. Service
E. Action
Name three methods by which client configuration can be performed in an explicit ProxySG deployment. (Choose three.)
A. Configure the user agent to point to the IP address or hostname of the ProxySG
B. Configure the user agent to point to the location of a PAC file
C. Configure the user agent to use WPAD
D. Use Symantec Management Center to configure the user agent
E. Configure forwarding hosts on the ProxySG
If you have configured continuous uploading of access logs and the ProxySG is unable to reach the upload destination, what happens to the log entries?
A. They are uploaded in real time to the backup upload destination configured in the Management Console
B. None of these answers
C. They are stored locally until the connection is re-established, and then they are uploaded
D. They are discarded
What Symantec product allows you to go back in time to identify the root cause of an infection or compromise?
A. Security Analytics
B. Management Center
C. Reporter
D. Content Analysis
When uploading access logs, which type of upload uses the least disk space on the ProxySG?
A. Continuous
B. Periodic
C. Weekly
D. Intermittent
Which of the following are recommended to improve CPU performance? (Choose two.)
A. Edit the size of emulated certificates
B. Deny wildcard certificates
C. Enable DHE
D. Reduce the number of emulated certificates
Where in the Management Console would you look to find all sessions that are being intercepted by the services framework of the ProxySG?
A. Heartbeats
B. Maintenance > System Tools
C. Statistics > Sessions > Active Sessions
D. Advanced statistics
A primary difference between a proxy server and a firewall is that proxy is not fundamentally what?
A. An edge device
B. A man-in-the-middle
C. A Layer 3 switch
D. A router