Topic 1: Volume A
The ProxySG can create configurable access logs for FTP, HTTP, and Telnet but not for
Peer-to-Peer or Real Media
A.
True
B.
False
False
Reference:http://www.bluecoat.co.jp/downloads/manuals/SGOS_Vol8_AccLog_5.3.1.pdf(p
age 37)
What acceleration techniques are NOT part of MACHS?
A.
Bandwidth management (traffic shaping)
B.
Protocol optimization and compression
C.
IP layer route optimization
D.
Object caching
E.
Byte caching
IP layer route optimization
Which option is NOT available to upload logfiles from ProxySG?
A.
HTTP server
B.
FTP server
C.
Blue Coat Reporter server
D.
CIFS/SAMBA file server
CIFS/SAMBA file server
https://kb.bluecoat.com/index?page=content&id=KB2983
What is the default time to cache authentication credentials in ProxySG for an
authentication realm?
A.
15 minutes
B.
30 minutes
C.
60 minutes
D.
90 minutes
15 minutes
Reference:http://download.cacheflow.com/manuals/SGOS3/ProxySG_CMG_Guide_3.1.4.p
df(page 39, logging out
When virus scanning functionality is enabled, ProxySG acts as an ICAP server, and
ProxyAV as an ICAP client.
A.
True
B.
False
False
Page 3 out of 46 Pages |
Previous |