Which ProxySG technology uses the data processing pipeline similar to the one shown in the picture?

Which ProxySG technology uses the data processing pipeline similar to the one shown in the picture?

Which of the following Authentication Realms are supported by Blue Coat in SGOS 5.3? (Choose all that apply)
(a) IWA(b) RADIUS(C) LDAP(d) TACACS+
What are the possible configurable options when configuring destination address in proxy services? (Choose all that apply)
(a) All(b) Any(c) Explicit(d) Transparent
What are the types of challenges that can be authenticated by ProxySG? (Choose all that apply)
(a) Administrator attempts to access Management console
(b) user attempts to access the internet
(c) Administrator attempts to access SG via SSH
(d) User attempts to access a CIFS file server
A ProxySG is designed to do which of the following? (Choose all that apply)
(a) Enhance security through authentication, virus scanning, and logging.
(b) Increase performance through TCP optimization, HTTP caching and pipelining.
(c) Control content with URL filtering, content stripping, and HTTP header analysis.