Which section of a policy trace would an administrator locate the original HTTP GET request in? (Choose the best answer.)
How does a network administrator access sysinfo files? (Choose the best answer.)
When can more than one authentication realm be active at any given time on the ProxySG? (Choose the best answer.)
What is a drawback to utilizing apparent data types to detect the file type? (Choose the best answer.)
Which two (2) items are considered external dependencies? (Choose two.)
What are two (2) methods by which the ProxySG can detect the type of a file that is downloaded? (Choose two.)
Which proxy service intercepts HTTPS traffic when browsers point directly to the ProxySG and Detect Protocol is enabled? (Choose the best answer.)
What should an administrator utilize in policies to specify which traffic should be decrypted? (Choose the best answer.)
Which section of the sysinfo file would an administrator examine to see how specific components are behaving? (Choose the best answer.)
What needs to be enabled for the Explicit HTTP service to be able to hand off SSL traffic? (Choose the best answer.)
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
Symantec Free Exams |
---|
![]() |