Question 6 of 242Which ProxySG technology uses the data processing pipeline similar to the one shown in the picture?
Correct Answer: B
Question 7 of 242Which of the following Authentication Realms are supported by Blue Coat in SGOS 5.3? (Choose all that apply) (a) IWA (b) RADIUS (C) LDAP (d) TACACS+
Correct Answer: C
Question 8 of 242What are the possible configurable options when configuring destination address in proxy services? (Choose all that apply) (a) All (b) Any (c) Explicit (d) Transparent
Correct Answer: A
Question 9 of 242What are the types of challenges that can be authenticated by ProxySG? (Choose all that apply) (a) Administrator attempts to access Management console (b) user attempts to access the internet (c) Administrator attempts to access SG via SSH (d) User attempts to access a CIFS file server
Correct Answer: D
Question 10 of 242A ProxySG is designed to do which of the following? (Choose all that apply) (a) Enhance security through authentication, virus scanning, and logging. (b) Increase performance through TCP optimization, HTTP caching and pipelining. (c) Control content with URL filtering, content stripping, and HTTP header analysis.