Name two settings that can be configured in a forwarding group to define which hosts in the group receive traffic. (Select all that apply)
Answer : A,D
In a CPL back reference of the form $(n), are references numbered from right to left or from left to right?
Answer : A
In a hybrid configuration using the ProxySG in conjunction with the Blue Coat Cloud
Service Web Security Module, how does the ProxySG determine when content filtering should be processed by the Cloud Service and not the ProxySG?
Answer : B
In a cookie in the users web browser, in a ProxySG authentication cache, or on the authentication server: Where are surrogate authentication credentials stored?
Answer : A
Reference:
https://bto.bluecoat.com/sgos/ProxySG/63/Authentication_WebGuide/Content/Topics/Auth entication/Concepts/surrogate_credentials_co.htm
When creating a TCP tunnel service in explicit mode, you must also configure a forwarding host?
Answer : A
Hostname of the BCAAA= serverl -
DNS suffix =bluecoat.com -
Hostname of the Bluecoat SG = sgo1
Referring to the above information, what is the correct syntax for the SPN command in the
Domain Controller?
Answer : C
The bcreportermain_v1 access log format has a configurable ordering of fields, and this custom order is reflected in a log file header.
Answer : A
The authentication mode origin-ip-redirect allows an administrator to assign a Time To Live
(TTL) for the surrogate credentials. Meanwhile the authentication mode origin-cookie- redirect does not provide this feature.
Answer : B
What criterion is NOT used to determine location awareness of a ProxyClient
Answer : C
What is the protocol used for Blue Coat Director to communicate with ProxySG?
Answer : C
In CPL, which of the following are possible results of a policy processing transaction?
(Select all that apply)
Answer : C
A service can be configured to listen in explicit and transparent mode simultaneously.
Answer : B
If the ProxySG and a client cannot successfully authenticate the use of Kerberos credentials during authentication in a realm where use of Kerberos credentials is enabled, what happens to the authentication request?
Answer : B
Reference:
https://bto.bluecoat.com/sgos/ProxySG/SecurityFirstSteps/6.5/Content/PDFs/Auth_IWA_Di rect_Solution.pdf (page 10)
When Blue Coat Director is used to manage a ProxySG, which one of these methods can
Director use to prevent unexpected changes from being made directly on the ProxySG?
Answer : B
A <cache>policy layer in CPL can best be implemented in which type of VPM layer?
Answer : C
Reference: https://bto.bluecoat.com/doc/5181 (page 2)
Have any questions or issues ? Please dont hesitate to contact us