Sie sind auf Seite 1von 2

1. SGOS is 64 bit or 32 bit operating system.

2. SGOS is which kind of operating system,


a. windows based,
b. linux based
c. custom.
3. Which physical proxy deployment poses a single point of failure to network, inline
xxx,transparent,explicit, none.
4. Difference between proxysg and firewall is that firewall is basically a ………,
a. Router
b. L4 switch
5. When connection is intialted by client to OCS in explicit proxy mode what is destination ip
address of connection, ProxySG is destination.
6. Which proxy edition provides secure web gateway functionality. Proxy mode.
7. IF you want to reset the password for proxysg what you can do choose 3 options?
a. You can login to serial console and run factory-rest command,
b. you can use the front panel to rest the password,
c. you can use the front panel reset button where available with proxy appliance.
8. What are the options given by management console.
a. Mantainance
b. Statistics
c. Configuration.
9. Which is not a part of proxy listener services
a. Source
b. Destination
c. Proxy type --correct
d. None
10. What is present in http GET message
a. Resourse
11. What are the three parts of HTTP GET message
12. How is configuration made by user is process by proxysg
a. It is converted into CPL and then get executed
13. Which layer of VPM handle encrypted traffic.
a. Ssl intercept layer
14. Set of rules AND-ed together to match a condition are called
a. Triggers
15. Bluecoat intelligences services provide which three of the following.
a. Risk rating
b. Content category
c. Content type
16. Bluecoat geolocation can block traffic based on which countries
a. UN approved countries
b. Only US based countries
c. All the countries
17. What does a category of Pending signify?
a. It says background checking for URL category is being performed
18. What does category of None signify?
a. It says no match for category has been found.
19. What are three the functions of ProxySG
a. Authentication
b. Encrypted traffic management
c. Malware prevention
20. What a ProxySG can do
a. Virus scanning
b. Traffic interception
c. Malware content filtering
21. What is the disadvantage of apperent data type file detection
a. Resourse over utilization
22. Which file detection method will not be able to detect the the mismatch between file type and
content type with in file?
a. Filename extension.
23. What are the two type of exceptions in ProxySG?
a. User defined and pre-defined
24. Can we make a pre-defined exception?
a. No
25. Which one of the following is not a access logging component?
a. Protocol
b. Log format
c. Log schedule.
26. When proxy SG is not able to contact the log recipient what will proxy do?
a. Proxy SG will buffer the logs locally .
27. What is the benefit of using BCAAA
a. If you cannot use API to connect directly to Directory services.
28. What is the advantage of using Kerberos authentication
a. Single sign on.
29. Where does the authentication surrogate saved ?
a. On proxy SG
b. On client browser---I chose this
30. Which layer of proxy handle SSL traffic
a. SSL intercept layer
31. What is the protocol used by httpd
a. 80
32. What are the policy check point used for?
33. What are the
34. Which resouse is use to moniter ecternal resourse?
a. Health check
b. Snmp
35. Something about client in server out , server in client out came
36. Which device enables you to go back in time to investigate an incident?
a. Security analytics

Das könnte Ihnen auch gefallen