Which best describes BCAAA? (Choose the best answer.)
A. An intermediary between the ProxySG and an authentication server
B. An application that sends sysinfo snapshots to Symantec support
C. Symantec's internal authorization and authentication service
D. A utility that allows a direct connection between the ProxySG and an authentication domain.
Which type of object is a Notify User object in the VPM? (Choose the best answer.)
A. Destination
B. Action
C. Track
D. Source
Which service setting determines whether the traffic is passed to the SSL proxy or the HTTP proxy when a browser is configured to use an explicit proxy connection to the ProxySG? (Choose the best answer.)
A. Enable SSL/TLS
B. Detect protocol
C. Authenticate-401
D. Forward client cert
Which section of a policy trace would an administrator locate the original HTTP GET request in? (Choose the best answer.)
A. Connection info
B. HTTP section
C. Policy decision
D. Header
Where does the ProxySG get the text of the exception page, when it sends an exception page to a client? (Choose the best answer.)
A. From the VPM-XML file
B. From WebPulse
C. From the exception definition stored on the ProxySG
D. From Symantec Technical Support
What happens when the ProxySG discovers a match for a rule in policy? (Choose the best answer.)
A. The ProxySG stops further processing in the layer containing the rule.
B. The ProxySG continues processing to see whether a further rule might negate the first rule.
C. It depends on the default policy configured.
D. The ProxySG stops further processing and executes the rule.
Which process should never be configured on external DNS servers? (Choose the best answer.)
A. Bypass the ProxySG's cache
B. Use DNS imputing
C. Perform lookups on internal servers
D. Perform reverse DNS lookups
Which VPM layer can be most commonly used to control decrypting of SSL traffic by authenticated username? (Choose the best answer.)
A. SSL Authentication layer
B. Web Authentication layer
C. SSL Intercept layer
D. None of these answers
When does the ProxySG establish an Schannel? (Choose the best answer.)
A. When the client sends an NTLM type 2 message to the ProxySG
B. When a client request is first received
C. When IWA authentication fails
D. When the client sends an NTLM type 3 message to the ProxySG
Which detection method would detect a mismatch between the file name and its content type? (Choose the best answer.)
A. Checking the MIME type
B. Checking the file extension
C. Checking the protocol type
D. Inspecting the file signature