===Proxy AV==
What ICAP refers to?
A.
It is a protocol for Webbased AV appliances to communicate with scanning engines of various
providers
B.
It is a standard developed by Blue Coat to communicate between ProxySG and other Blue Coat
appliances
C.
It is a TCPbased protocol for HTTP request and response modification
D.
It is an approach used by media servers for Digital Rights Management
NO.1 What can be concluded about this request processing order?
A. ProxyAV Is accessed in ICAP REQMOD mode
B. ProxyAV is accessed ICAP RESPMOO mode
C. ProxySG with ProxyAV is deployed as a forward proxy
Answer: A
Licensing of the Proxy AV is done through the ProxySG interface.
A.
True
B.
False
B
Which of the following types of traffic are scanned with ICAP RESPMOD?
A.
HTTP responses
B.
FTP uploads
C.
HTTP PUT data
D.
HTTP POST data
E.
All of the above
A
QUESTION 97
How many different
anti-virus scanning engines can you run simultaneously on a ProxyAV?
A. 1
B. 2
C. 3
D. 4
Correct Answer: A
QUESTION 107
Client makes a Web
request to a Web Server, and ProxySG is using ProxyAV in RESPMOD mode. Which
devices are involved before the request reaches the original destination Web
server?
A. Client, (2) ProxySG, (3) ProxyAV, (4)
ProxySG, (S) Web server
B. Client, (2) ProxySG, (3) ProxyAV, (4)
Web server
C. client, (2) ProxySG, (3) Web server
D. (l) Client, (2) ProxyAV, (3) ProxySG,
(4) Web server
NO.19 Which of the following types of traffic are not scanned with ICAP REQMOD?
A. HTTP PUT data
B. FTP uploads
C. FTP responses
D. HTTP POST data
Answer: C
ICAP responses may be cached on a ProxySG, i.e. for some Web requests ICAP processing may
be completed without involving ProxyAV?
A.
True
B.
False
B
ProxyAV 1400 and 2400 are more powerful than other models by the following criteria. (Select 3)
A.
There can be a longer queue of the objects to be scanned
B.
They have more scanning processes
C.
CIFS and SSL protocols are supported
D.
Larger network bandwidth can be served by the appliance
E. More AV scanning vendors are supported
B D E
QUESTION 26
If an error occurs
during Proxy AV request or response processing, which of the following will
occur?
A. The connection will be allowed
B. The connection will be denied
C. The response is determined by the ICAP
object properties in policy
D. The response is determined by the ICAP
configuration properties in the management console
Correct Answer: D
QUESTION 28
The ProxySG acts as
both an ICAP client and ICAP server.
A. True
B. False
Correct Answer: B
QUESTION 85
Which
of the following policies CANNOT be implemented on the ProxyAV? (Choose all
that apply)
(a) Blocking viruses,
worms, spyware and trojans
(b) Blocking file types
using apparent data type (file signature)
(c) Blocking files that
exceed a size limit set by the administrator
(d) Blocking password
protected archive files
A. a
only
B. b only
C. c only
D. d
only
E. All
of the above can be implemented with the Proxy AV
Correct Answer: E
QUESTION 92
In
the VPM, source triggers can be used in conjunction with the ICAP RESPMOD
action.
A. True
B. False
Correct Answer: A
QUESTION 48
Which
virus-scanning engine is NOT supported by ProxyAV?
A.
MCAfee B. Sophos
C. Norton
D. Kaspersky
E.Panda
Correct Answer: C
QUESTION 93
What can be concluded
about this request processing order?
A. ProxyAV is accessed in ICAP REQMOD mode
B. ProxyAV is accessed ICAP RESPMOD mode
C. ProxySG with ProxyAV is deployed as a
forward proxy
D. Proxy SG with ProxyAV is deployed as a
reverse proxy
Correct Answer: A
QUESTION 40
Which HTTP error code corresponds to the ProxySG
default exception identifier icap_error?
A.
|
403
|
B.
|
404
|
C.
|
503
|
D.
|
401
|
Correct Answer: C
QUESTION 51
Which HTTP error code corresponds to the ProxySG default exception identifier icap_error?
A. 403
B. 404
C. 503
D. 401
Correct Answer: C
QUESTION 44
When
virus scanning functionality is enabled, ProxySG acts as an ICAP server, and
ProxyAV as an ICAP
client.
A. True
B. False
Correct Answer: B
QUESTION 76
The ProxySG ICAP
implementation is fully compatible with which of the following applications? (Choose
all that apply)
(a) Finjan SurfinGate
(b)
Webwasher
(c) Antivirus Scan
Engine (SAVSE)
(d) Trend Micro InterScan
A. a
& b only
B. b & c only
C. c
& d only
D. All
of the above
Correct Answer: D
=Authentication , SSL/ BCAAA / SSH,Telnet , WEBUI , Console=
NO.3 An administrator created a PIN for the ProxySG front panel, disabled the built-in administrative account
and introduced policy-based admin auttiohration, and secured die serial port. After this was done, all the
PINs, passwords and policy settings were lost. What options are available to regain access to the
appliance? (choose all that apply)
(a)Return ProxySG appliance to Blue Coat to restore a default SGCS image
(b)Restore the factory settings by pressing and holding a reset button for 5 seconds, configure the
appliance anew or restore its configuraoon from a backup
(c)Try out all 10000 combinations of PIN for the front panel until you find the right one
(d)Remove the hard disk from the ProxySG, connect it as an external SAT A disk to any Windows or Linux
computer; clear the admin entry in the /etc/ pssswd file on that disk. Put the hard disk back in ProxySG,
start it up and reset the admin's password.
A.a only
B.a and b only
C.a and c only
D.a and d only
E.All of the above
Answer: B
QUESTION 75
The following
authentication realms will be used in a sequence realm. Which realm should go
first?
A. Local
B. IWA
C. Radius
D. LDAP
Correct Answer: A
On the ProxySG, can more than one authentication realm be active at any given time?
A.
Yes
B.
No
A
For the ProxySG to decrypt SSL traffic, does the traffic need to be intercepted by a proxy service?
A.
Yes
B.
No
A
How does a local authentication realm know what credentials to authenticate against?
A.
The administrator creates a user list on the ProxySG and associates it with one or more local
realms.
B.
By communicating with the domain controller.
C.
A local authentication realm contains its own list of valid credentials.
B
When specifying a search user for an LDAP authentication realm, what administrative permissions
are required on the search user account? (Select all that apply)
A.
All read allow.
B.
Inherit.
C.
Owner all allow.
D.
No special permissions are required.
B
From the viewpoint of the ProxySG, a user login consists of which three components? (Select 3)
A.
IP address
B.
Password
C.
Authentication realm
D.
Username
E.
User agent
A C D
Which attribute is used in authentication in a Microsoft Active Directory LDAP authentication
realm?
A.
sAMAccountName
B.
firstname
C.
last name
D.
cn
D
What happens, when administrator makes some changes in ProxySG Management Console and
presses Revert button two times?
A.
The nexttolast configuration (i.e. immediately preceding the last press of Apply) is restored.
B.
The nexttolast configuration (i.e. immediately preceding the last press of Apply) is restored
only if the history tracking is enabled in the Management Console.
C.
The last saved configuration is restored and the second Revert has no effect.
D.
Nothing is changed on ProxySG as the two presses of the same button cancel each other.
D
What do you need to enable NTLM authentication?
A.
Active directory server and authentication license
B.
BCAAA and authentication license
C.
BCAAA
C
QUESTION 78
When accessing
Management Console from the Web, the built in admin account uses the regular
password of CLI access (NOT the enable password of admin account)
A. True
B. False
Correct Answer: A
When accessing default administrative account with the ProxySG Management Console, which
one of these passwords is used?
A.
Console password
B.
Enable password
C.
Setup Console password
D.
Front panel PIN code
???
Which of the following tasks could be performed from the Blue Coat Management Console?
(Choose all that apply)
(a) SG Initial Setup
(b) Authentication Realm Configuration
(c) Bandwidth Class Configuration
(d) Resetting Trial Period
A.
a & b only
B.
b & c only
C.
c & d only
D.
All of the above
If the ProxySG is not receiving any power, how does the Management Console indicate this?
A.By displaying a health status of Critical.
B.The Management Console will not load.
C.By displaying a red power icon at Maintenance > System and Disks > Environment
B
How does the Management Console perform commands on the ProxySG?
A.By generating the appropriate CLI commands and executing them.
B.By usIng Content Policy Language to control the ProxySG.
C.By using proprietary APIs to perform function calls on the ProxySG.
D.None of the above
A
Which is NOT a good reason to configure user authentication when deploying ProxySG as an
Internet gateway proxy?
A.
To allow creation of granular polices by user or group
B.
To allow more detailed logging and reports
C.
To enable more convincing coaching pages for AUP violations
D.
To ensure that cache content is not expired
E.
To protect against unauthorized access of Web objects found in cache
D
QUESTION 37
What is the default
time to cache authentication credentials in ProxySG for an authentication
realm?
A. 15
minutes B. 30 minutes C. 60 minutes D. 90
minutes
Correct Answer: A
QUESTION 79
Which
console services are NOT available on the ProxySG?
A. SSH
B. HTTP
C. HTTPS
D. Serial
E. All
the above are available
Correct Answer: E
QUESTION 46
Is
Management Console accessible over HTTP?
A. Yes,
it is enabled by default, except in FIPS mode
B. It
can be explicitly enabled, the default port is 8081
C. It
can be explicitly enabled, the default port is 8082
D. A
new service has to be created with port selected by the administrator
Correct Answer: B
QUESTION 53
What changes, when FIPS
mode for Management Console is enabled?
A. FIPS mode improves browser support
B.
Management
Console can be accessed via TLS-based HTTPS only; some device certification
options are changed
C. FIPS mode makes Management Console
application faster as the rich client download size decreases
Correct Answer: B
QUESTION 38
What is in NTLM Type 2
Message?
A. Domain + Workstation Name
B. Challenge for the Client
C. Usemame and Password
D. Client Response for the challenge
Correct Answer: B
In NTLM authentication, passwords are normally transmitted in which of these ways?
A.Plaintext
B.Base 64-encoded
C.Encrypted
D.None of the abov
NO.14 What are the types of challenges that can be authenticated by ProxySG? (choose all that apply)
(a)Administrator attempts to access Management console
(b) user attempts to access the internet
(c)Administrator attempts to access SG via SSH
(d)User attempts to access a CIFS file server
A.All of the above
B.b, c andd only
C.a, c and d only
D.a, b and c only
Answer: D
QUESTION 39
Which of the following console services are enabled by default? (Choose all that apply)
(a) HTTP port 8081
(b) HTTPS port 8082
(c) HTTPS port 8083
(d) SSH port 22
A. a & c only
B. b & d only
C. c & d only
D. a & b only
Correct Answer: B
When does the ProxySG require the use of BCAAA with an IWA realm?
A. When using Kerberos credentials.
B. When your organization does not permit the ProxySG to join the Windows domain of the
authentication server.
C. When you are using two or more IWA realms on the same ProxySG.
D. When you are performing SSL interception
A
What service group does Blue Coat recommend for the Telnet service?
A.
Bypass recommended
B.
Default
C.
Standard
D.
Tunnel recommended
D
What are the types of challenges that can be authenticated by ProxySG? (Choose all that apply)
(a) Administrator attempts to access Management console
(b) user attempts to access the internet
(c) Administrator attempts to access SG via SSH
(d) User attempts to access a CIFS file server
A.
All of the above
B.
b, c &d only
C.
a, c & d only
D.
a, b & c only
D
====Policy / VPM / OBJECTS ===
NO.4 The ProxySG gives you the ability to write policies through.
A. the graphical visual Policy Manager and/or the command-line interface
B. Visual Policy Manager only
C. the graphical visual Policy Manager, the command-line interface and/or imported text file
Answer: C
QUESTION 73
Which layer can be used
to block a particular URL?
A. Authentication
B. Web
Access
C. Forwarding
D. Web Content
Correct Answer: B
If you do not enable authentication on the ProxySG, can you still write policy to control client
access to web content?
]A.
Yes, but only on certain criteria
B.
Yes
C.
No
c
A policy configured in VPM contains several Web Access layers, each contains several rules. Where a policy rule should be placed to ensure that it is always invoked and its action (e.g.
ALLOW or DENY) is not overridden by any other rule?
A.
First in the first layer
B.
First in the last layer
C.
Last in the first layer
D.
Last in the last layer
a??
QUESTION 89
Which
of the following are true about the rules processing in the VPM? (Choose all
that apply)
(a) Rules are processed
in a top down sequence.
(b) Layers are processed
from left to right regardless of type. (c) Layers are processed according to
layer type.
(d)
Layers of the same type are processed from left to right.
A. None
of the above
B. b. c
& d only
C. a, b & c only
D. a, c
& d only
Correct Answer: D
What is the purpose of the VPM-XML file?
A.
It stores the visual state of the VPM user interface.
B.
It stores the policy statements that are generated from the VPM.
C.
It allows the administrator to use the VPM from any XMLcapable web browser without
accessing the Management Console.
B
When policy created in the VPM is installed, what two files does the VPM update on the ProxySG?
(Select 2)
A.
VPM-CPL file
B.
Local policy file
C.
VPM-XML file
D.
Central policy file
A C
Which of the following policy tasks require using the VPM and cannot be performed in CPL?
(Select all that apply)
A.
Creating a combined Destination object for use in policy processing.
B.
Specifying formbased authentication.
C.
Configuring SSL interception.
D.
None of the above
D
Which of the following parts of a URL are NOT casesensitive? (Select all that apply)
A.
Query parameters
B.
Host name
C.
Protocol name
D.
None of the above
BCan you have more than one Web Access layer active in the VPM at any given time?
A.
Yes
B.
No
B
If the VPM displays two Web Access layers, which one is evaluated first?
A.The one that is visually to the left.
B.The one that is visually to the right.
C.The answer depends on the contents of each layer
A
What are the four types of VPN trigger objects? (Select 4)
A.
Action
B.
Authentication
C.
Service
D.
Destination --
E.
Source --
F.
Time--
??
===Exceptions / Notifications/ Splash / Coaching===
NO.8 The goal of creating and using Notify User objects is (Choose all that apply)
(a)to deny access to a URL
(b)to deliver a splash page to the clients
(c)to warn a user before allowing access to a URL
A.a and b only
B.b and c only
C.All of the above
Answer: B
QUESTION 95
Coaching or splash
pages have to be configured through CPL rather than VPM.
A. True
B. False
Correct Answer: B
What are the two types of ProxySG exceptions?
A.
Predefined and userdefined.
B.
Global and local.
C.
Notify and trap.
D.
Explicit and transparent
A
Access Denied (policy_denied)
Welcome. SUNNYVALE\student01i
Unfortunately, the “Adult/Mature Content” sites are not allowed.
To get the above custom message, how would you write the placeholder variables into an
exception page?
A. Welcome, $(cs.user)!Unfortunately, the “${cs.uri.categories)” sites are not allowed.
B. Welcome, $(cs.user)!Unfortunately, the “${exception.categories)” sites are not allowed.
C. Welcome, %CS_USER%!Unfortunately, the “%URI_CATEGORY%” sites are not
allowed
B
QUESTION 88
Which HTTP error code corresponds to the ProxySG
default exception identifier policy_denied?
A.
|
403
|
B.
|
404
|
C.
|
503
|
D.
|
401
|
Correct Answer: A
The placeholder variables that are available in ProxyClient’s exception templates (i.e. the screens
that are displayed, when there is a policy violation) are the same ones that are available for userdefined exceptions within ProxySG.
A.
True
B.
False
QUESTION 96
Which HTTP error code corresponds to the ProxySG
default exception identifier authentication_failed?
A.
|
403
|
B.
|
404
|
C.
|
503
|
D.
|
401
|
Correct Answer: D
ProxySG has its explicit HTTP service set to intercept with the default settings. An LDAP
authentication realm is used, authentication mode value is auto. What is the first response code
that a client receives as it connects to the Internet for the first time?
A.
302
B.
401
C.
200
D.
407
BHTTP status codes requesting client authorization are 3digit numbers of the following form:
A.
1xx
B.
2xx
C.
3xx
D.
4xx
E.
5xx
D
What are the two types of ProxySG exceptions?
A.
Predefined and userdefined.
B.
Global and local.
C.
Notify and trap.
D.
Explicit and transparent
A
Notify user objects utilize cookies and http redirection to deliver error messages to clients.
A.
True
B.
False
In exception hierarchy exception myexreption is child of Exception.Userdefined.all. This means
that the value for all paramaters (format, contact, summary, http code, etc.) are copied from
Exception.Userdefined.al settings to myexception unless these values are explicity overriden.
A.
True
B.
False
B
QUESTION 99
Which HTTP error code
corresponds to the ProxySG default exception identifier
dns_unresolved_hostname?
A.
|
403
|
B.
|
404
|
C.
|
503
|
D.
|
401
|
Correct Answer: B
QUESTION 40
Which HTTP error code corresponds to the ProxySG default exception identifier icap_error?
A.
|
403
|
B.
|
404
|
C.
|
503
|
D.
|
401
|
Correct Answer: C
QUESTION 106
Assume explicit proxy
deployment where LDAP authentication realm is used. Authentication mode value
is auto. What is the first response code that a client receives as it attempts
to connect to the Internet for the first time?
A.
|
200
|
B.
|
302
|
C.
|
401
|
D.
|
407
|
Correct Answer: C
QUESTION 67
Which of the following
statements are true? (Choose all that apply)
(a) Exceptions and
notifications can be configured to use specific HTTP response codes.
(b) Exceptions and
notify user objects can be created through the VPM.
(c) Exceptions and
notify user objects can be utilized as action objects in the VPM.
(d) Exceptions and
notify user objects can include substitutions such as the IP address, username
or category.
A. a & b only
B. a, c & d only
C. b & c only
D. a, b & c only
Correct Answer: B
QUESTION 65
What
are requirements for client's browser for notification and coaching pages to
work properly?
A. Pop-up
windows should not be blocked
B. JavaScript has to be enabled
C. Cookies have to be enabled
D. Both JavaScript and cookies have to be
enabled
Correct Answer: C
QUESTION 64
What kind of object
should be selected from button New in the New Action dialogue in the VPM that
returns a coaching or splash page?
A. Return
Exception
B. Return Redirect
C. Notify
User
D. Acceptable
Usage Policy
Correct Answer: C
In the VPM, what type of object is a Notify User object?
A.Destination
B.Source
C.Action
D.Track
C
What are the possible
configurable options when configuring destination address in proxy services?
(Choose all that apply)
(a) All
(b)
Any
(c)
Explicit
(d)
Transparent
A. a, c
& d only
B. a, b & c only
C. b, c
&d only
D. All
of the above
Correct Answer: A
NO.9 The default policy for ProxySG is DENY. Network administrator creates a VPM policy allowing access
to some Web host only for certain users (see picture). When installing this policy, ProxySG issues a
warning that this rule will be ignored. What change can be applied in order to fix this?
A. Add another rule to the Web Access layer creating an exception for users NOT allowedto access the
host.
B. Add another Web Access layer and set its default action to Allow.
C. Add Web Authentication layer with a rule having Force Authenticate action.
D. Add Web content layer with a rule preventing serving content fromProxySG cache to unauthorized
users.
Answer: B / C
From where does the exception exception.user-defined.all inherit its properties?
A.The exception.user-defined definition.
B.The default exception configuration in the Management Console.
C.The exception.all definition.
A
=Proxy Services /HTTP / PACKET FLOW / Ports / listener=
QUESTION 25
HTTP/1.1 supports
pipelining - multiple related requests are written to a single TCP socket
without waiting for the responses to come back -- i.e. the requests are done
asynchronously in-parallel, instead of doing them sequentially as usual (see
picture). Some Web clients such as Opera and Firefox with FasterFox plugin use
HTTP pipelining. Assume that ProxySG Is deployed as a forward proxy listening
on port 8080.
A. If an HTTP client tries to use
pipelining, the use of proxy will break the HTTP protocol.
B.
For
those HTTP clients that use pipelining, the use of forward proxy would ensure
faster response time compared to the clients that do not use pipelining.
Correct Answer: B
QUESTION 83
Can
server initiate an HTTP transaction?
A. It
cannot
B. It
can for e.g. Web-based instant messaging, AJAX and similar server-push
applications
C. It
can only for some HTTP request methods
Correct Answer: B
QUESTION 103
Since which version the
HTTP protocol has persistent TCP connections and Keep-alive headers?
A. HTTP/0.9
B. HTTP/1.0
C. HTTP/1.1
Correct Answer: C
When performing a packet capture of traffic that is seen by a ProxySG between a client and
server, what is the main advantage of performing the capture on the ProxySG rather than on a
client?
A.
Packet order is not disrupted.
B.
Only serverside traffic is visible.
C.
Only clientside traffic is visible.
D.
Both clientside and serverside traffic are visible
d
In which type of physical deployment is a ProxySG out of path but still has potential visibility to all
traffic through the use of a device such as a WCCPcapable router or a Layer 4 switch?
A.
Explicit
B.
Transparent
C.
Inline
D.
Virtually inline
d
Which types of requests are likely to be served the fastest?
A.
TCP_MISS
B.
TCP_NC_MISS
C.
TCP_HIT
D.
TCP_MEM_HIT
E.
TCP_RESCAN_HIT
DWhy does the Internal HTTP proxy service use the TCP Tunnel proxy by default?
A.
Some internal applications are not fully HTTPcompliant, which might cause the ProxySG to
reject connections.
B.
The TCP Tunnel proxy delivers the best performance for intranet addresses.
C.
The TCP Tunnel proxy delivers the best security for intranet addresses.
D.
The Internal HTTP proxy service does not use the TCP Tunnel proxy by default
A
Which proxy service matches incoming traffic if it does not match any other service?
A.
External HTTP
B.
Default
C.
TCP Tunnel
D.
Internal HTTP
In which client connection type are user agents aware that a proxy has been deployed?
A.
Explicit proxy
B.
Transparent proxy
AIn an explicit ProxySG deployment, the TCP packet sent from the client to the ProxySG contains
what value as the destination IP address?
A.
The IP address of the ProxySG or a load balancer.
B.
The IP address of the client.
C.
The IP address of the origin content server.
D.
The answer depends on whether client IP address reflection is enabled on this ProxySG.
When a proxy service listener matches incoming client traffic and is set to Bypass, what happens
to the traffic?
A.
The ProxySG determines whether any other proxy service listeners match the same traffic but
are set to Intercept.
B.
The ProxySG returns an exception to the client.
C.
The ProxySG passes the traffic through to the original destination without additional processing.
D.
The ProxySG silently drops the connection.
E.
The answer depends on whether the client is using an explicit or transparent proxy connection.
CAssume that ProxySG has default policy set to Allow; it is configured so that the HTTP proxy
service on port 8080 has Detect Protocol option disabled and there are no policy rules on either
SSL Intercept Layer or SSL Access Layer. A Web browser is accessing an HTTPS site, using
explicit proxying on the ProxySG, port 8080. What would happen to this traffic?
A.
The HTTPS connection will never be established
B.
The HTTPS connection will always be established
C.
The HTTPS connection will be established only for the remote server port 443.
D.
The HTTPS connection will be established only for the remote server port 443 unless there are
rules on Web Access Layer, explicitly allowing other port numbers.
D
Persistent TCP connections are enabled by default starting with which version of HTTP?
A.
1.1
B.
0.9
C.
1.0
D.
None of the above
A
By looking at the above HTTP GET request, what are the possible proxySG deployment methods
that could be in used? (Choose all that apply)
(a) Default Route
(b) WCCP
(c) PAC
(d) WPAD
A.
a, d only
B.
c, d only
C.
b, c only
D.
None of the above
B
Can ProxySG services configure multiple listeners on the same TCP port?
A.
Yes, the service listeners are scanned top down as displayed under Configuration > Services >
Proxy Services , and the first matching listener is always used
B.
No, each TCP port can have up to one listener, which is set to either Bypass or Intercept .
C.
Yes, the listener with the most specific (longest) network mask is chosen, if there are several
listeners configured on the same port
D.
Yes, configuring multiple listeners is used to do internal load balancing; they help to distribute
incoming TCP connections between multiple listener threads
Which of these proxy service components are responsible for detecting incoming traffic that matches specific IP addresses or subnets?
A.
Listeners
B.
Services
C.
Proxies
A
Why should ProxySG set HTTP proxy behavior profile to “portal” in a reverse proxy deployment?
(Choose all that apply)
(a) To ensure ProxySG will ignore reload attempt.
(b) To only allow authenticated users that are allowed to browse the page.
(c) To ensure that ProxySG will trust server expiration header.
(d) To restrict client access by UserAgent type.
A.
a & b only
B.
a & c only
C.
b & d only
D.
b & c only
E.
c & d o
What are the four components of a ProxySG proxy service? (Select 4)
A.
Attributes to control proxy processing.
B.
Administrative password.
C.
Listener parameters to match against.
D. Which proxy to use.
E.
Service time to live (TTL).
F. Whether to intercept or bypass.
A , C , E , F
What is sent over HTTP, if user enters nonASCII characters into the address window of a Web
browser (e.g. the URL address shown in the image)?
A.
The UTF16 representation of these characters is being sent, since HTTP supports Unicode
B.
The special characters are Base64 encoded before sending
C.
URL address contains sequence of the form %HH%HH%HH, where “HH” is a hexencoding of
bytes representing the nonASCII characters
D.
Special characters are sent as bytes, using the current encoding of the Web page
C
In a transparent ProxySG deployment, the TCP packet sent from the client to the ProxySG
contains what value as the destination IP address?
A.The IP address of the origin content server
B.The IP address of the ProxySG
C.The IP address of the client
D.The answer depends on whether client IP address reflection is enabled on this ProxySG
A
In a TCP connection, what will a listener service attempt to match before deciding to intercept or to
bypass the connection? (Choose all that apply)
(a) Source IP
(b) Destination IP
(c) Destination Port
(d) Source Port
A.
a & b only
B.
b & c only
C.
c & d only
D.
All of the above
D
QUESTION 102
HTTP response typically
contains headers and the body (data). Does HTTP request contain body (data)?
A. HTTP requests contain headers
(including cookie data) only
B. HTTP requests contain body only if the
request is file upload
C. HTTP requests contain body only if it
is a POST (rather than GET) request
D. HTTP requests contain body, if they are
HTML form submissions
Correct Answer: A
The HTTP request from a client to a proxy uses addresses as shown in the picture. It follows that the ProxySG serves as transparent proxy.
A.
True
B.
False
B
Consider an inline deployment — see figure.
Assume that a browser on Client0l is configured to use SG01 as an explicit proxy on port 8080.
The only service on SG01 set to Intercept is the HTTP service on port 8080 for the
destination address. Default policy is ALLOW and there is no custom policy. What will the user see in the browser window after requesting a Web page?
A. A message “Proxy Server Refused Connection” or similar (depending on the browser being used). B. “Access denied” message due to policy DENY
C. Nothing, there will be a timeout error
D. The requested Web page will be served to the browser
DName two different ways to create a transparent proxy environment.
A.
Using the PAC File or configuring WCCP
B.
Configuring a Layer 4 switch or configuring the appliance in bridging mode
C.
Configuring WCCP or using an automatic configuration script
B C
QUESTION 68
What happens, if there
are multiple listeners to the same TCP port, and destination IP address belongs
to multiple IP address ranges?
A. Such configuration is Inherently ambiguous
and wrong
B. Such cases cause built-in exceptions to
be thrown during policy processing
C. The most specific IP address range is
always used
Correct Answer: A
QUESTION 30
What is returned to the
HTTP request" GET / HTTP/ 1.1 "?
A. The listing of the webroot directory of
the Web server
B. The file index.html
C. A file that is configured as a
default/welcome file for that Web server
Correct Answer: C
QUESTION 101
If Proxy SG acts as a
Web proxy, does the Origin Content Server (OCS) see the client's IP address or
the proxy server's IP address?
A. Content Server always sees client's IP
address
B. Content Server always sees Proxy Server's
IP address
C. Content Server sees client's IP
address, if the proxy is configured as transparent proxy
D.
The
IP address seen by the Content Server depends on the Proxy SG
configurationparameter reflect- client-ip
Correct Answer: C
When using transparent authentication, which of the following statements is true?
A.
The virtual URL used for originstyle redirects must resolve to the IP address of the ProxySG.
B.
The virtual URL used for originstyle redirects must resolve to an IP address.
C.
The virtual URL used for originstyle redirects must be configured as an IP address.
D.
The virtual URL used for originstyle redirects must be configured as a host name.
A
==Network / IP / Routing / ipv6=====
QUESTION 72
If you set a service
attribute on the ProxySG to "Reflect Client IP", what must you make
sure is not going to happen in the network?
A. The
service destination IP is set to "transparent" and Action is set to
"Intercept".
B. Force Authentication through policy.
C. Asymmetric routing directly from client
to OCS.
Correct Answer: A
Which of the following statements are true about WCCP? (Choose all that apply)
(a) WCCP version 1 only redirects traffic based on TCP destination port 80 while WCCP version 2
can redirect more than just port 80.
(b) WCCP version 1 supports only single proxy while WCCP version 2 can support up to 32
proxies in a single service group.
(c) WCCP version 1 is the default version supported by ProxySG unless configured otherwise.
(d) WCCP version 2 is more suitable for multiple router deployment as it allows multicast
discovery.
A.
a & b only
B.
b & d only
C.
a & d only
D.
a & c only
C
Can you use IPv6 addressing on a ProxySG that communicates via WCCP with its router?
A.
Yes
B.
No
B
What optional features or licenses must you purchase to enable IPv6 support on the ProxySG?
A.
SSL license
B.
No special licenses are required
C.
IPv6 license
D.
None of the above
b
Which are the two packets that are used in WCCP discovery process? (Choose all that apply)
(a) HERE_I_AM
(b) HOME_ROUTER_IP:
(c) I_SEE_YOU
(d) WEB_CACHE_HERE
A.
All of the above
B.
a, b & c only
C.
b & d only
D.
a & c only
D
===DIRECTOR===
QUESTION 62
Blue
coat Director functions include the following (Choose all that apply)
(a) Provide centralized
initial setup and policy management
(b) Configure secure
gateway and WAN
acceleration
(c) Monitor hardware
and software metrics and events on ProxySG appliances
(d) Enable proxying and filtering of multicast
UDP traffic
A. a, b
& c only
B. a, b & d only
C. a, c
& d only
D. b,c & d only
Correct Answer: A
QUESTION 91
Find
the configuration or management activity that is NOT among the functions of the
Blue Coat Director
CANNOT
be used?
A. Configuration
of a large number of ProxySG appliances
B. Policy
updates on ProxySG appliances
C. Virus definition updates for AV
scanning D. Setup and licensing
E. All
the above actions can be done by a Director
Correct Answer: D
QUESTION 81
Which
appliance does not need any licensing and is fully operable after deployment?
A.
ProxyAV
B.ProxySG
C. ProxyRA
D. Blue
Coat Director
Correct Answer: D
What are the two hardware chassis options that are available in Blue Coat Director? (Choose all
that apply)
(a) SG210
(b) SG510
(c) SG800
(d) SG8100
A.
a & b only
B.
b & c only
C.
c & d only
D.
a & d only
Find the configuration or management activity that is NOT among the functions of the Blue Coat
Director CANNOT be used?
A.Configuration of a large number of ProxySG appliances
B.Policy updates on ProxySG appliances
C.Virus definition updates for AV scanning
D.Setup and licensing
E.All the above actions can be done by a Director
D
=== Content Filtering / Webfilter / WEBPULSE / LocalDB===
QUESTION 31
What is true
immediately after the initial setup of ProxySG?
A. None of the content filtering databases
is set up
B. Only the default Blue Coat WebFilter
database is set up and available
C. Blue Coat WebFilter database and 3rd
party databases are set up and available
Correct Answer: A
QUESTION 66
What does the Blue Coat
WebFilter do to classify sites not found in the WebFilter on-box database?
A. Sends classification requests to
WebPulse
B. Runs Bayes classification algorithm on
ProxySG
C. Forwards
categorization requests to other ProsySG D. Matches against a list of forbidden
keywords
Correct Answer: A
When WebFilter is enabled, how often does the ProxySG check for updates to the WebFilter
database?
A.
Once every five minutes.
B.
Once every five minutes, during the hours of the day that are specified in the Management
Console.
C.
Once every day, during the hours of the day that are specified in the Management Console.
D.
Once every hour.
A
What is WebPulse technology?
A.
A platform used to emulate ProxySG realtime operating system (SGOS) on other OS and
platforms
B.
Traffic shaping algorithm to optimize bandwidth consumption and throughput
C. Website categorization service, used by content filtering
D. Mechanism to reconcile contradictory policies defined in ProxySG Visual Policy Manager
C
Which statement is true about language support for Blue Coat WebFilter onbox database and
Dynamic Categorization technologies?
A.
Both onbox database and dynamic categorization categorize Web sites in all human
languages, but the precision of categorization results vary.
B.
Onbox database and dynamic categorization support the same list of languages and do not
categorize Web sites written in other languages.
C.
If dynamic categorization algorithm correctly identifies the language of a Web site, then the
algorithm can also categorize Web sites in that language based on Bayes analysis of words found.
D.
Onbox database may contain categorizations for Web sites in languages that are not
recognized by dynamic categorization
C
When using WebPulse with Blue Coat WebFilter, how can you determine the list of operations that
can be associated with the application facebook?
A.
In the CLI, enter enable mode, and perform the command show contentfilter bluecoat
operations facebook
B.
In the Management Console, go to Configuration > Content Filtering > General, click View
categories, and scroll through the list until you find facebook
C.
In the Management Console, go to Configuration > Content Filtering > General, enter
facebook.com into the URL field, and click Test
B
If the DRTR is enabled in real time, but does not have categorization value for the requested
URL?
A.
the URL will be assigned to the category none
B.
the URL will be assigned to the category pending
C.
the URL will be assigned to the category unavailable
D.
the URL will assigned to the category uncategorized
A
Which of the following categorization method would incur additional costs (not covered by
ProxySG and BCWF licenses)?
A.
SurfControl Categorization
B.
Local Database Categorization
C.
IWF Categorization
D.
DRTR Categorization
D
Which of the following categorization method would incur additional costs (not covered by
ProxySG and BCWF licenses)?
A.
SurfControl Categorization
B.
Local Database Categorization
C.
IWF Categorization
D.
DRTR Categorization
D
Which one of the following categorization methods is not covered by ProxySG and Blue Coat
WebFilter licenses and would incur additional costs?
A.
SurfControl categorization
B.
Local database categorization
C. WebPulse categorization
D.
IWF categorization
What categories are included in Blue Coat WebFilter onbox database and recognized by the WebPulse dynamic categorization?
A.
There is a simple list of 23 categories
B.
There is a hierarchy of 36 first level categories, and several hundred second level categories
C.
There is a simple list of 69 categories
C
After a URL has been categorized by the WebPulse background rating service, when are the
results returned to the ProxySG that initiated the request? (Select all that apply)
A.
At the next scheduled update of the Blue Coat WebFilter database.
B.
Immediately, if the category is Adult or Pornography.
C.
On demand by the ProxySG administrator.
How many content filtering databases can be used in a policy for SGOS 5.3 at the same time
(apart from the local database and IWF restricted categories)?
A.
Only one content filtering database
B.
Any two content filtering databases
C.
Two content filtering databases — BCWF and one other
D.
Any number of content filtering databases from the list supported by ProxySG
D
ProxySG uses a licensed Blue Coat Web Filter (BCWF), and has configured policies for URL
categories. ProxySG uses a DNS server, which for some reason cannot resolve the domain name
sp.cwfservice.net anymore. What happens to the content filtering policy evaluation in this case?
A.
Any time when policy evaluation needs to categorize an URL, access to that page is denied.
B.
ProxySG always uses whatever action is configured for the System/unavailable category
C.
Policy evaluation is not affected, because ProxySG uses the default IP address of a WebPulse
Service Point
D.
Policy evaluation is not affected for URLs categorized in the BCWF database, and is evaluated
as System/unavailable for any other URLS.
B
How frequent are updates of WebFilter onbox database within the ProxySG?
A.
Every 5-20 minutes during the time intervals set in the Management Console
B. When the previous database subscription period ends, approximately once every 60 days
C.
Once every day, the specific time is configurable via Management Console
D.
Only when the administrator presses button Download now, to downloads a new bcwf.db file to
the ProxySG
A
How frequent are updates of WebFilter onbox database within the ProxySG?
A.
Every 520 minutes during the time intervals set in the Management Console
B. When the previous database subscription period ends, approximately once every 60 days
C.
Once every day, the specific time is configurable via Management Console
D.
Only when the administrator presses button Download now, to downloads a new bcwf.db file to
the ProxySG
Which of the following categorization method incur additional costs (not covered by ProxySG and
BCWF licenses)?
A.
Local Database Categorization
B.
IWF Categorization
C.
SurfControl Categorization
D.
DRTR Categorization
D
A URL that is categorized by WebFilter can have how many applications associated with it?
A.
Zero or one
B.
Exactly one
C.
Up to three
D.
Unlimited
A
What is the behavior of content filtering policies, when the Blue Coat WebFilter license expires?
A.
All content is blocked
B.
All content is allowed
C.
Content is allowed or blocked depending on policy for System/unlicensed
D.
Content is allowed or blocked depending on fail open or fail closed setting in Management
A
QUESTION 42
When
the DRTR successfully categorizes a site, the site is (Choose
all that apply)
(a) Added to the static
BCWF database on the ProxySG
(b) Added to the local database on the ProxySG
(c)
Added to the DRTR database on the ProxySG
(d)
Added to a DRTR cache that resides on the ProxySG
A. a
& b only
B. b & c only
C. d
only
D. None
of the above
A
QUESTION 58
Which
statements are true about the Blue Coat WebFilter? (Choose all that apply)
(a) A single web site
can belong to multiple categories
(b) Embedded images and objects may be
denied, even though the container page is allowed.
(c) WebFilter on-box
database can be used in conjunction with a third party content database
(d)
WebFilter on-box database updates are Web downloads
A. a, b
& c only B. A. b & d only C. a, c
& d only D. b, c & d only
E. All
of the above
Correct Answer: E
QUESTION 105
When the Blue Coat Web
Filter is enabled, the DRTR
A. is disabled by default
B. is enabled only through VPM policy
C. is enabled to work in the background by
default
D. is enabled to work in real-time by
default
Correct Answer: D
WebPulse uses URL information from which of these Blue Coat products? (Select all that apply)
A.ProxySG
B.Blue Coat K9
C.ProxyAV
D.ProxyClient
==Authentication Realms==
NO.5 Which of the following Authentication Realms are supported by Blue Coat in SGOS 5.3? (Choose all
that apply)
(a)IWA
(b)RADIUS
(C)LDAP
(d)TACACS+
A.a, b and d only
B.b, c and d only
C.a, b andc only
D.All of the above
Answer: C
Which of the following authentication realms are supported in SGOS version 6.2?
(Select all that apply)
A.
RADIUS
B.
LDAP
C.
TACACS+
D.
IWA
A B D
===ssl====
NO.6 The Connect HTTP method is reserved for use with a proxy that can dynamically switch to being a
tunnel e.g. SSL tunneling.?
A. True
B. False
Answer: A
NO.7 Forward proxy of SSL allows applying policies to encrypted SSL data.
A. True
B. False
Answer: B
How can you prevent passwords from being sent in plaintext between the ProxySG and an LDAP
server?
A.
By enabling SSL communication between the ProxySG and the authentication server.
B.
By disabling anonymous search in this LDAP realm.
C.
By changing the TCP port number for the LDAP primary server host from 389 to 443.
D.
You cannot do this
A
QUESTION 86
The
SSL certificate returned by the Management Console upon HTTPS access .
A.
is
birth certificate, which depends on the device serial number only; it can be
cached for the whole lifetime of the ProxySG
B. is
generated anew automatically every time ProxySG performs initial setup
C. has
to be generated explicitly from the CLI
Correct Answer: B
Which versions of SSL and TLS does the ProxySG support? (Select all that apply)
A.SSL version 1.0
B.SSL version 2.0
C.SSL version 3.0
D.TLS version 1.x
A & D
When a ProxySG processes an SSL transaction between a client and a content server, does the
ProxySG function as an SSL client or as an SSL server?
A.SSL client
B.SSL server
C.Both
A
==Logging / Access logs==
In which of the following ways can Access Logging be enabled? (Choose all that apply)
(a) By a CLI command
(b) In the Management Console under Access Logging
(c) By adding another layer to VPM policy
A.
a & b only
B.
a & c only
C.
b & c only
D.
All of the above
A
NO.18 Which option is NOT available to upload logfiles from ProxySG?
A. HTTP server
B. FTP server
C. Blue Coat Reporter server
D. CIFS/SAMBA file server
Answer: C ----D?
Which statement is not true?
A.
A VLAN trunk is a physical link that connects two switches together.
B.
A VLAN trunk is used for frametagging.
C.
A trunk port connects to CIFS server.
D.
A trunk port erases the tag in a frame
By default, what log format is associated with the main log facility?
A.elff
B.http
C.bcreportermain_v1
D.main
D
The bcreportermain_vl access log format has a configurable ordering of fields, and this custom
order is reflected in a log file header.
A.
True
B.
False
B
How are entries in the ProxySG event log classified?
A.
By proxy
B.
By severity level
C.
By number of affected clients
D.
By service
B
Which of the following access log formats are supported by the ProxySG? (Choose all that apply)
(a) ELFF
(b) SQUID
(c) Websense
(d) NCSA
A.
a, b & c only
B.
a, b & d only
C.
a, c & d only
D.
b, c & d only
E.
All of the above
B
QUESTION 47
HTTP Access log format bcreportermain_vl includes the time of the request, URL requested, and MIME
type of content, but does not include whether it is cache hit or miss.
A. True
B. False
Correct Answer: A
The ProxySG allows you to upload compressed access logs or plaintext access logs.
A.
True
B.
False
A
QUESTION 84
The
ProxySG can create configurable access logs for FTP, HTTP, and Telnet but not
for Peer-to-Peer or
Real
Media
A. True
B. False
Correct Answer: B
Which of the following access logging features are supported by the ProxySG? (Select 4)
A.
Signing, to certify that a particular ProxySG wrote and uploaded the log.
B.
Encryption, to encrypt the data as it is transferred to the remote server.
C.
Logging all user group memberships for the HTTP transactions performed by authenticated
users (IWA and LDAP realms).
D.
Compression, to save on data transfer between the ProxySG and the remote server.
E.
Bandwidth management, to facilitate availability of minimum bandwidth for the access log data
transfer from ProxySG to the log upload server
A B C D
QUESTION 49
Which
of the following tracks client-server requests and server responses?
A. Event
logs
B. Sys
logs
C. Report
logs
D. Access logs
Correct Answer: D
Which compression algorithm is used by ProxySG during WAN acceleration?
A.
Huffman code
B.
gzip
C.
tar
D.
bzip2
B
You CANNOT create custom log formats.
A.
True
B.
False
B
Which of the following is true about enabling access logging? (Choose all that apply)
(a) Access logging is disabled by default on newly configured systems.
(b) You can enable access logging through the Management Console only.
(c) You must configure the ProxySG to intercept protocols you wish to log.
A.
a & b only
B.
a & c only
C.
b & c only
D.
All of the above
QUESTION 35
What happens to ProxySG
logging, when uploading them to a remote FTP server becomes impossible?
A.
When
there is no more space for logging, ProxySG switches on dynamic bypass forTCP
connections -- stops intercepting traffic
B.
When
there is no more space for logging, ProxySG will process policy, but will
ignore any logging- relatedpolicies or configuration settings
C. ProxySG erases old logs but continues
writing the more recent ones
D. Either logging stops or older log files
are erased -- depending on the ProxySG configuration
Correct Answer: C
When using the ProxySG to send information related to a service request, which of these items
can the ProxySG transmit to Blue Coat? (Select all that apply)
A.Policy trace
B.Event log
C.Sysinfo file
D.Packet capture
E. Memory core dump
B and D
=== REPORTER ===
QUESTION 90
Which capabilities are
limited in Blue coat Reporter standard edition compared to Enterprise edition?
(Choose all that apply)
(a)Data profile number
is limited to five
(b)Reports
can be displayed, but cannot be saved as PDF or CSV
(c)Only
single processor is supported
(d)Report
customization is limited
A. a, b
& c only
B. a, b & d only
C. a, c
& d only
D. b, c & d only
E. All
of the above
Correct Answer: C
QUESTION 36
Which protocol and port
is used by Blue Coat Reporter service to display results?
A. HTTP port 8987
B. HTTP port 8443
C. FTP port 8021
D. SNMP port 161
Correct Answer: A
If an access log file has no header, how does Blue Coat Reporter process the file?
A. By using the header of the most recently processed file.
B. By using default header settings configured by the administrator.
C. It cannot, unless the administrator manually recreates the header and prepends it to the file.
B
QUESTION 55
Reporter creates
reports that can be saved in the following formats (choose all that apply)
(a) CSV (comma-separated-values) to be opened
by Excel
(b) Adobe PDF
(c) HTML
(d) XML
A. a, b
& c only
B. a, b & d only
C. a, c
& d only
D. b, c & d only
E. All
of the above
Correct Answer: A
QUESTION 45
What
are the best practices using anti-virus software on a windows machine running
Blue Coat Reporter?
A. Do
not use anti-virus software as the log files cannot contain viruses
B. Perform
scans as you would for any windows server
C. Perform
scans only during low activity of ProxySG
D. Perform
scans, but bypass certain directories containing frequently changing files
Correct Answer: D
PROXY SG / PROXY CLIENT BASICS / Deployment
QUESTION 61
Which function is NOT a characteristic feature of proxy servers?
A. Making requests in the Internet, using HTTP, FTP, SOCKS on behalf of other clients
B. IP Masquerading - replacing original requestor's address with it's own
C. Encapsulating one protocol into another protocol
D. Caching previously requested resources
NO.11 A ProxySG is designed to do which of rhe following? (choose all that apply)
(a)Enhance security through authentication, virus scanning, and logging.
(b)Increase performance through TCP optimization, HTTP caching and pipelining.
(c)Control content with URL filtering, content stripping, and HTTP header analysis.
A.a and b only
B.b and c only
C.a and c only
D. All of the above
Answer: D
Can proxy servers modify traffic between a client and server?
A.
Yes
B.
No
A
Some models of the ProxySG have a user limit. The user limit is based on which one of these
factors?
A.
The number of unique client IP addresses with open inbound TCP connections to the ProxySG.
B.
The specific license that has been purchased for and installed on that ProxySG.
C.
The number of concurrent open TCP connections to the ProxySG.
A
Various models of ProxySG (e.g. 8105 and 81010) have different user limits. What is a user
limit?
A.
The number of unique IP addresses is not different for the both models, but there is a strictly
enforced limit of simultaneous TCP connections that each model supports
B.
User limit is the recommended number of unique IP addresses that can connect to the
ProxySG for the given hardware. ProxySG can be configured to exceed this limit.
C.
It is the number of unique IP addresses that can connect to the ProxySG, and this limit is strictly
enforced by the license.
B
It is possible to upgrade the version of ProxyClient installation on a ProxySG without upgrading its SGOS version.
A. True
B. False
A
Proxy servers and firewalls are network security devices that________
A.
can be used interchangeably.
B.
complement each other.
C.
are capable of controlling Layer 2 to Layer 7 traffic.
D.
can spoof client IP addresses.
A B C
What happens, if ProxyClient is deployed in a place that does not match any conditions in the
Location Awareness?
A.
Content filtering is enabled, but acceleration is disabled
B.
Acceleration is enabled, but content filtering is disabled
C.
Default settings for filtering and acceleration are applied
D.
ProxyClient is passive in such case, so neither filtering nor acceleration can work
C
For ProxyClient content filtering to work, the client’s computer should be able to do a correct
lookup of DNS address sp.cwfservice.net.
A.
True
B.
False
A
QUESTION 33
Which best describes the role of a proxy server?
A. A device that inspects Layer 2 - Layer 4 traffic running through it and denies or permits based on a set of policies.
B. An intermediary program, which acts as both a server and a client for the purpose of making requests
on behalf of other clients.
C. An intermediary program that protects the resources of a private network from users on other networks. D. A device that extracts the destination address of a packet, selects ten best path for the packet and
forwards the packet the next device in the path.
Correct Answer: B
User with administrative rights can stop ProxyClient as a Windows service.
A.
True
B.
False
A
===Bluecoat Technology / Products /Features
NO.10 Which ProxySG technology uses the Gaca processing pipeline similar to the one shown in the picture?
A. Blue Coat Reporter
B. MACH5
C. BCWF
D. ProxySG Services
Answer: B
All of the following are software based Blue Coat solutions:
Blue Coat Reporter, Blue Coat WebFilter, Blue Coat K9, ProxyClient
A.True
B.False
A
When the disk space on a ProxySG is 95% full, which of these features or functions become
unavailable? (Select all that apply)
A.Object caching
B.Access logging
C.Content filtering
D.None of the above
QUESTION 52
What is the name of the
Technical SupportWeb site where service requests can be reported?
A. WebPulse
B. BlueTouch Online
C. Blue Coat Professional Services
Correct Answer: B
You can obtain support information without contacting anyone from Blue Coat support via Blue
Coat’s online tool, Instant Support.
A.
True
B.
False
B
You need to have an open service request (SR) with Technical Support to upload your ProxySG
configuration information to Blue Coat directly from the Management Console.
A.
True
B.
False
A
NO.12 Which streaming services are supported by ProxySG?
A. QuickTime, Windows Media, and Real Media
B. Windows Media, Real Media, and Flash
C. QuickTime, Flash, and MP4
Answer: B
NO.13 Which is NOT a support- related site for Blue Coat products?
A.http://forums.bluecoot.com
B. http://services.bluecoat.com
C. http://download.bluecoat.com
D. http://webpulse.bluecoat.com
Answer: D
QUESTION 98
Which WAN Optimization
feature can accelerate the transfer of several similar, uncompressed files
between two locations? (Two files are called similar, if their editing distance
is small, compared to the size of the files. For example, if one file can be
obtained from another one by inserting or deleting a small fragment.)
A. Protocol Optimization
B. Object Caching
C. Byte Caching
D. Bandwidth Management
Correct Answer: C
QUESTION 104
Which WAN Optimization
features require at least two ProxySG appliances to work? (Check all that
apply)
(a) Protocol Optimization
(b) Object Caching
(c) Byte Caching
(d) Application
Delivery Network (ADN)
A. a
& b only
B. b & c only
C. c
& d only
D. All of the above
Correct Answer: C
Which of these is equivalent to the following IPv6 address?
fe80::2d0:83ff:fe04:9c9e
A.
fe80:0000:2d00:83ff:fe04:9c9e
B.
fe80:0000:02d0:83ff:fe04:9c9e
C.
fe80:0000:0000:0000:02d0:83ff:fe04:9c9e
D.
fe80:0000:0000:0000:2d00:83ff:fe04:9c9e
C
Can you use the same ProxySG default gateway for both IPv4 and IPv6 addressing?
A.
Yes
B.
No
B
When a ProxySG is being used as an IPv4toIPv6 gateway, how does the ProxySG determine the
IPv6 address of the content server to which a client request should be directed?
A.
By querying the IPv6 DNS server(s) that have been specified in the ProxySG configuration.
B.
By querying the Internet gateway router that has been specified in the ProxySG configuration.
C.
By using the IPv4toIPv6 lookup table that the administrator has installed on the ProxySG.
A
When configured as part of an IPv6 network, how does the ProxySG gets its IPv6 address?
A.
The ProxySG obtains an IPv6 address for each interface automatically, but the administrator
cannot change these after completing initial configuration.
B.
The administrator must supply an IPv6 address manually.
C.
The ProxySG obtains an IPv6 address for each interface automatically, and the administrator
can change these after completing initial configuration
C
QUESTION 69
Management Console of
ProxySG (SGOS v. 5.4- or earlier) is based on the following client-side
technology:
A. FIPS mode improves browser support
B. Java servlet application
C. JVM applet embedded in the Web page
D. Adobe Flex
E. AJAX and JavaScript
Correct Answer: C
What clientside technology does the Management Console use?
A.
Java applets
B.
HTML5
C.
Ajax
D.
FlasH
NO.15 What acceleration techniques are NOT part of MACHS?
A. Bandwidth management (traffic shaping)
B. Protocol optimization and compression
C. IP layer route optimization
D. Object caching
E. Byte caching
Answer: C
QUESTION 41
To
implement ProxySG as a default gateway, which of the following options has to
be enabled?
A. Early
intercept
B. Reflect
Client IP
C. IP Forwarding
D. Detect
Protocol
Correct Answer: C
QUESTION 50
If a proxy server is
seen in the external Internet as Web server, it is a forward proxy.
A. True
B. False
Correct Answer: B
QUESTION 21
In SGOS 5.3, what are
the two versions that you can opt for? (Choose all that apply)
(a) Proxy dition
(b) Full Edition
(c)WAN Opt Edition
(d) MACH5 Edition
A. b&c only
B. a, c & d only
C. c & d only
D. a & d only
Correct Answer: D
QUESTION 43
Which
of the following is a free software based Blue Coat product for home users?
A. Web
Filter
B. k9
C. SiteAdvisot
Correct Answer: B
QUESTION 44
When
virus scanning functionality is enabled, ProxySG acts as an ICAP server, and
ProxyAV as an ICAP
client.
A. True
B. False
Correct Answer: B
NO.16 A single ProxySG appliance can act as a Gateway Proxy and WAN Acceleration Proxy at the same
time.
A. True
B. False
Answer: A
QUESTION 54
When Proxy server settings in a browser are configured using WPAD (web Proxy Auto Discovery) protocol, what has to be specifically guaranteed to ensure security?
A. JavaScript on client's browser must be enabled, otherwise it will not allow to execute proxy configuration script.
B. Hosts (e.g. wpad.mydepartment.mycompany.com, wpad.mycompany.com) should be trusted not to serve malicious wpad.dat files
C. Internet Explorer browser should receive security updates more often than twice a year
D. DHCP must be accessible at the time, when user starts a browser
Correct Answer: B ??
QUESTION 34
After the initial
boot-up. Blue Coat SGOS will automatically boot into a trial license. What is
the duration of that period?
A. 30
days - trial can be prolonged by CLI command reset-trial
B. 60
days-trial can be prolonged by CU command reset-trial
C. 90
days
D. 120 days
Correct Answer: B
QUESTION 22
What ProxySG appliance has these default settings?
(a) Default policy is ALLOW
(b) Trust client destination IP is ON (c) Tolerate HTTP errors is ON;
A. Proxy Edition
B. Reverse Proxy Edition
C. MACH5 Edition
D. Trial Edition
Correct Answer: C
Can you change from the Proxy Edition to the MACH5 Edition of SGOS?
A.Yes, and the relevant portions of the previous configuration are preserved.
B.No.
C.Yes, but the previous configuration is lost
C
QUESTION 80
The
ProxySG operating system is based on .
A. a customized,
object oriented version of FreeBSD
B. a
custom built operating system with integrated caching and compression
C. a
Linux Kernel 2.6.x with byte caching and compression
Correct Answer: B
QUESTION 23
Which software product provides Web content filtering for windows and Mac OS computers, is locally configurable, and can produce a barking sound, when user violates a filtering policy.
A. ProxyAV
B. Blue coat WebFilter
C. Blue Coat k9
D. Blue Coat Director
Correct Answer: C
In WebPulse, does background analysis of URLs use human raters?
A.
No.
B.
Yes, but only if requested through the site review website.
C.
Yes, but only if machine analysis is inconclusive.
QUESTION 74
All of the following
are software based Blue Coat solutions:
Blue Coat Reporter,
Blue Coat WebFilter, Blue Coat K9, ProxyClient
A. True
B. False
Correct Answer: A
QUESTION 27
When the ProxySG 200's power LED indicator alternates between green and amber, it means that the system is booting.
A. True
B. False
Correct Answer: B
===INSTANT MESSAGING / IM , Streaming===
NO.17 Which Instant Messaging proxies are available on the ProxySG? (Choose all that apply)
(a)AIM
(b)Jabber
(c)MSN
(d)Yahoo
A.a, b and c only
B.a, b and d only
C.A. c and d only
D.b. c and d only
E.All of the above
Answer: C
Use of the Flash streaming proxy requires the installation of an optional license.
A.True
B.FalSE
A
Which group of services does not have a specialized proxy and is handled by TCP Tunnel
instead?
A.
HTTP, HTTPS, FTP
B.
SOCKS
C.
LDAP, IMAP, SSH
D.
QuickTime, Real Audio
E.
AOL, MSN IM, Yahoo IM
E
QUESTION 32
Which of the following
policies can be applied to Instant Messaging traffic? (Choose all that apply)
(a) A policy to deny
the transfer of specific file types or file sizes
(b) A policy to deny a
specific IM request method
(c) A policy to deny a
key word or words using a regular expression
(d) A policy to deny a
specific IM buddy or IM chat room
A. a, b
& c only
B. b, c & d only
C. a, c
& d only
D. All of the above
Correct Answer: A
QUESTION 87
ProxySG has to be
deployed inline (in bridging mode) or virtually inline (using WCCP or an L4
switch) in order to block IM traffic.
A. True
B. False
Correct Answer: B
QUESTION 82
ProxySG can provide all
these services to IM clients -- client authentication at a proxy, message
reflection, policy enforcement and logging.
A. True
B. False
Correct Answer: A
===Installation===
NO.20 Which of the following methods is NOT appropriate for the initial setup for a ProxySG 2XX series?
A. Serial console Cable
B. LCD Panel
C. Web Wizard accessing HTTPS port 8083
D. Blue Coat Director applying a profile
Answer: D
True or false: Blue Coat Director cannot be used to configure a ProxySG until an IP address has
been assigned to the ProxySG by either the front panel or the serial console.
A.True
B.False
If you create a configuration archive on a ProxySG, which of the following steps must you perform
to restore that archive onto a different ProxySG? (Select all that apply)
A.
In the Management Console of the source ProxySG, disable enforcement of signed images.
B.
Restore the destination ProxySG to factory defaults.
C.
In the Management Console of the destination ProxySG, disable enforcement of signed
images.
D.
Save the SSL keyring configurationpasswordskey on the source, and restore it at the
destination.
E.
You cannot do this
A
How can a user restore ProxySG back to its default, factory settings, so that its IP address etc.
needs to be configured anew? (Choose all that apply)
(a) Press a button on ProxySG back panel (left arrow on front panel for some models) and hold it
for about 5 seconds
(b) Enter a CLI command ( restoredefaults factorydefaults ) and confirm it with y(yes) .
(c) Press a button in Management Console that drops the network configuration, and confirm the
warning dialog.
A.
a & b only
B.
a & c only
C.
b & c only
D.
All of the above
Core vs. edge deployment refers to ProxySG appliance being located closer to the servers vs.
closer to the clients.
A.
True
B.
False
B
Which one of these statements is true about the factory default settings of a ProxySG?
A.
An unconfigured ProxySG tries to get an IP address from a DHCP server.
B.
Blue Coat Director can be used to assign an IP address to an unconfigured ProxySG.
C.
An IP address can be assigned to an unconfigured ProxySG by using either the serial
connection or, on models that have one, the front panel.
D.
An unconfigured ProxySG sends a RARP request to look up its IP address from the MAC
address of its network interface card. If it cannot get a valid IP address, initial setup is required.
C
What configuration of ProxySG can be created during web initial setup wizard? (Choose all that
apply)
(a) IP address or addresses, mask, gateway, DNS address or addresses
(b) and settings – and manager and backup manager
(c) password for web management Console and CLI enabled mode.
A.
A, B only
B.
A, C only
C.
B, C only
D.
All of the above
B
True or false: Blue Coat Director cannot be used to configure a ProxySG until an IP address has been assigned to the ProxySG by either the front panel or the serial console.
A. True
B. False
B
Can a ProxySG automatically get its own IPv4 address during initial configuration?
A.
Yes
B.
No
B
QUESTION 100
Which statement is true
about a ProxySG with factory settings:
A. To get network access, initial setup is
necessary -- ProxySG does not have an IP address until then
B.
Unconfigured
ProxySG responds to some of the pre-built IP addresses, which are contained in
the private IP address ranges 10.0.0.0/255.0.0.0 and 172.16.0.0/255.240.0.0 and
192.168.0.0/255.255.0.0
.
C. Unconfigured ProxySG tries to obtain IP
address from a DHCP server
D.
Unconfigured
ProxySG sends RARP request to look up its IP address from the MAC address of
its network interface card. If it cannot get a valid IP address, initial setup
is required.
Correct Answer: A
QUESTION 63
What
preconditions should be satisfied in order to do initial configuration from a
client computer via the
URL
https://proxysg.bluecodt.com:8083? (choose all that apply)
(a) Client computer
should be directly connected to ProxySG with a cross-over cable
(b) ProxySG should have
a pass-through card
(c)
ProxySG should be deployed in the bridging mode
A. a
& b only
B. a & c only
C. b
& c only
D. All
of the above
Correct Answer: B
===Endpoint/VPN===
QUESTION 24
What are
"unmanaged endpoints' which make the Blue Coat RA (Remote Access)
appliance useful?
A. TCP connection sources or destinations,
which are outside our LAN
B. Workstations, which need to be in a
virtual private network, but VPN clients cannot be installed on them
C. Mobile
user laptops, which are used in places not protected by ProxySG D. Hosts
without installed ProxyClient or with disabled ProxyClient
Correct Answer: B
QUESTION 29
A parent exception can
provide the default values for a child exception.
A. True
B. False
Correct Answer: A
True or false: Blue Coat Director cannot be used to configure a ProxySG until an IP address has been assigned to the ProxySG by either the front panel or the serial console. A. True B. False