Which service is provided by the ProxySG? (Choose the best answer.)
A. Virus scanning
B. Strong authentication
C. Edge routing
D. Sandboxing
Which type of object is a Notify User object in the VPM? (Choose the best answer.)
A. Destination
B. Action
C. Track
D. Source
What is typically the biggest load on a CPU when managing encrypted traffic? (Choose the best answer.)
A. Emulating certificates
B. Using the SHA-2 hash function
C. Using RSA encryption
D. The need for redirection
How does an administrator view policy coverage statistics? (Choose the best answer.)
A. View the Policy Coverage statistics section of the sysinfo.
B. Use an advanced URL.
C. Create a dedicated layer in the VPM.
D. Use a global policy trace.
What allows WebPulse to provide real-time revisions to the WebFilter database? (Choose the best answer.)
A. Dynamic categorization
B. Creating a local database
C. Threat risk levels
D. Configuring application controls
What are the four principal policy checkpoints in the order they are reached, in a typical client HTTP request? (Choose the best answer.)
A. Client in, server out, server in, client out
B. Client in, server out, client out, server in
C. Client in, server in, client out, server out
D. Client in, server in, server out, client out
Which VPM layer can be most commonly used to control decrypting of SSL traffic by authenticated username? (Choose the best answer.)
A. SSL Authentication layer
B. Web Authentication layer
C. SSL Intercept layer
D. None of these answers
Which proxy service intercepts HTTPS traffic when browsers point directly to the ProxySG and Detect Protocol is enabled? (Choose the best answer.)
A. SSL
B. Explicit HTTP
C. HTTPS
D. TCP Tunnel
What does the SSL Proxy do by default? (Choose the best answer.)
A. Scans traffic for malware
B. Blocks encrypted traffic
C. Tunnels all HTTPS traffic
D. Intercepts all HTTPS traffic
Which detection method would detect a mismatch between the file name and its content type? (Choose the best answer.)
A. Checking the MIME type
B. Checking the file extension
C. Checking the protocol type
D. Inspecting the file signature