BCCPP : Blue Coat Certified ProxySG Professional : Part 08

  1. Which of the following steps have to be performed to support Kerberos Authentication?

    (Choose all that apply)

    (a) A virtual URL that resolves to the IP of the ProxySG.

    (b) Registering the BCAAA as a Service Principal Name.

    (c) Configuring IWA Realm.

    (d) Configuring Explicit Proxy.

    • All of the above
    • None of the above
    • a, b & c only
    • b, c & d only
  2. Which of the following are true when attempting to deny access to file types?

    • MIME type objects are matched against the Content-type request header; File Extension objects are matched against the GET response header; Apparent Data Type objects are matched against request data.
    • MIME type objects are matched against the Content-type response header; File Extension objects are matched against the GET request header; Apparent Data Type objects are matched against response data.
    • MIME type objects are matched against the Content-encoding response header; File Extension objects are matched against the GET request header; Apparent Data Type objects are matched against response data.
    • MIME type objects are matched against the Content-type response header; File Extension objects are matched against the GET request header; Apparent Data Type objects are matched against request data.
  3. Which of the following statements are true about ProxySG Protocol Detection feature?

    (Choose all that apply)

    (a) Protocol detection is performed on the server’s response.

    (b) Protocol detection is performed on the client’s request.

    (c) Enabling Detect Protocol option will automatically enable early intercept attribute in proxy services.

    (d) Protocol detection is performed by looking at the TCP port number.

    • a & b only
    • b & c only
    • c & d only
    • All of the above
  4. Which of the following statements are true about Reverse Proxy deployment? (Choose all that apply)

    (a) Forwarding hosts in the forwarding file must be defined as “server” style

    (b) Default-scheme in forwarding file is supported

    (c) Protocol conversion between HTTPS <- ->HTTP are automatic

    (d) ProxySG should be set with default DENY policy

    • a, b & c only
    • a, c & d only
    • b, c & d only
    • All of the above
  5. The ProxySG acts as both an ICAP client and ICAP server.

    • True
    • False
  6. When a ProxyClient setup file is manually on a client’s computer, what data transfer takes place before ProxyClient is installed?

    • ProxyClient setup program is self-contained; there is no data transfer necessary in order to complete the installation of the ProxyCinent
    • ProxyCilent setup program cause download of the most recent updates from a public download site https://hypersonic.bluecoat.com/.
    • ProxyClient setup program transfers data form Client Manager ProxySG appliance before it can install successfully.
    • ProxyClient setup program transfers data form the AND manager (or backup AND manager) ProxySG appliance before it can install successfully.
  7. What are the two functions of configuring forwarding in ProxySG? (Choose all that apply)

    • To accelerate application
    • Reverse Proxy
    • To support Proxy Chaining
    • To intercept SSl
  8. What is the protocol used for Blue Coat Director to communicate with ProxySG?

    • SSL
    • Telnet
    • SSH v2
    • HTTPS
  9. At which checkpoint does the rewrite () perform the TWURL modification?

    • Client In
    • Client Out
    • Server In
    • Server Out
  10. Health checks are automatically created under which scenarios? (Choose all that apply)

    (a) When a forwarding host is created.

    (b) When a failover group is created.

    (c) When the DRTR is enabled.

    (d) When a SOCKS gateway is created.

    • a, b & c only
    • a, c & d only
    • b, c & d only
    • All of the above
  11. When a backup ProxySG takes over because the master fails, which of the following will occur?

    • Policy from the master is replicated on the backup.
    • A failover event is logged in the event log.
    • An email notification is sent to the ProxySG administrator.
    • The backup begins replying to ARPS for the Virtual MAC address.
  12. ProxySG is configured to permit error but guest authentication is not configured. What will happen to a user who initiates a connection to the Internet?

    • The user will receive an error notifying unsuccessful authentication.
    • The user will be allowed to proceed as a guest user.
    • The user will be allowed to proceed as unauthenticated.
    • The user will receive an error notifying Access Denied.
  13. Which of these are the features of a Blue Coat Director? (Choose all that apply)

    (a) Install and update configurations of a group of ProxySG

    (b) Distribute and control content of a group of ProxySG

    (c) Managing SSL VPN configuration

    (d) Monitoring ProxySG Performance

    • a, b & c only
    • a, b & d only
    • b, c & d only
    • a, c & d only
  14. Which of the following are obvious advantages of having a ProxySG deployed in a Reverse Proxy environment? (Choose all that apply)

    (a)The ProxySG has built in DOS protection to guard the actual web server from denial-ofservice attacks

    (b) Increased performance with caching provides an improved Web Experience

    (c) Consistent default behavior of cache expiration and validation directives

    (d) SSL termination on ProxySG allow SSL offloading, therefore eliminating bottleneck on the web server side.

    • All of the above
    • a, b & c only
    • a, b & d only
    • b, c & d only
  15. The Content-encoding header is used to declare the MIME type and compression method used in a HTTP response.

    • True
    • False
  16. With ProxySG failover, the failover Virtual IP address can be the same as the IP address assigned to the master.

    • True
    • False
  17. After creating CPL in the local policy file, the policy is imported into the VPM CPL file so that it can be viewed through the Visual Policy Manager.

    • True
    • False
  18. Which client deployment methods support the 407 Proxy Authentication Required response code? (Choose all that apply)

    (a) Proxy Auto Configuration files
    (b) WCCP
    (c) Proxy settings in browser
    (d) Inline Bridging

    • a & b only
    • b & c only
    • c & d only
    • a & c only
    • All of the above
  19. The ProxySG ICAP implementation is fully compatible with which of the following applications? (Choose all that apply)

    (a) Finjan SurfinGate

    (b) Webwasher

    (c) AntiVirus Scan Engine (SAVSE)

    (d) Trend Micro InterScan

    • a & b only
    • b & c only
    • c & d only
    • All of the above
  20. Which statement is correct about Proxy-Authenticate header

    • It is sent by the proxy every time when a HTTP 407 status code is sent
    • It is used by a browser to pass credentials to a proxy
    • It is used by both client and proxy to negotiate the method of credential exchange
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments