BCCPP : Blue Coat Certified ProxySG Professional : Part 10

  1. Which regular expression should you test against a URL to match both http and https schemes?

    • 2https?
    • [http][https]
    • ^https?
    • http[s]
  2. A policy trace can be enabled for any layer type.

    • True
    • False
  3. In an SSL transaction in which the server’s certificate is not from a trusted authority, which entity generates the warning that is displayed in a web browser?

    • The web browser.
    • The server.
    • The ProxySG.
    • The answer depends on how the ProxySG has been configured.
  4. Where can you get the SNMP MIBs for the version of SGOS running on your ProxySG?

    • BlueTouch Online.
    • At https://proxyIPaddr:8082/mibs, where proxyIPaddr is the IP address of your ProxySG.
    • From the vendor of your network management software. https://kb.bluecoat.com/index?page=content&id=FAQ718&actp=RSS

    Explanation:

    Reference: https://kb.bluecoat.com/index?page=content&id=KB1472&actp=LIST

  5. Is it possible to run more than one version of a BCAAA processor on a Windows computer?

    • Yes
    • No
    Explanation:
    Reference: https://bto.bluecoat.com/doc/19172 (page 4)
  6. Which of the following cashing techniques utilize retrieval workers to keep the contents of the cache fresh? (Choose all that apply.)

    (a) Cost-based Deletion

    (b) Asynchronous Adaptive Refresh

    (c) Popularity Contest

    • a & b only
    • b & c only
    • All of the above
    • b only
  7. In which of the following ways can Access Logging be enabled? (Choose all that apply.)

    (a) By a CLI command

    (b) In the Management Console under Access Logging

    (C) By adding another layer to VPM policy

    • a & b only
    • a & c only
    • b & c only
    • All of the above
  8. If a user cannot be derived through the Window SSO realm, then the client will .

    • be prompted with an authentication dialog box to provide credentials.
    • receive an authentication error from the proxy.
    • proceed as an unauthenticated user.
    • receive an authentication form from the proxy to provide credentials.
  9. Log format variable rs(Content-Type) always refers to Content-type header value sent from the proxySG to the client.

    • True
    • False
  10. When configuring Blue Coat Director, how can an administrator be authenticated? (Choose all that apply.)

    (a) Local configured accounts and password

    (b) RADIUS

    (c) IWA

    (d) TACACS+

    • All of the above
    • a, b & c only
    • a, c & d only
    • a, b & d only
  11. Which server certificate validation errors can be ignored within ProxySG policy? (Choose all that apply)

    (a) Untrusted issuer

    (b) Host name mismatch

    (c) Expiration

    • a & b only
    • b & c only
    • a & c only
    • All of the above
  12. Which authentication realm is NOT supported for authenticating administrators to the management console?

    • IWA
    • Radius
    • Local
    • Sequence
    • All the above are supported
  13. CPL is required when creating which types of policy?

    • Two-Way URL rewrites
    • Policy that utilizes layer guards
    • Policy that involves local users and groups
  14. While configuring Blue Coat directory, what is an Overlay?

    • A few selected setting used to replace some of the configuration in ProxySG.
    • A snapshot of all the configuration in ProxySG.
  15. Which statement is correct about Proxy-Authorization header?

    • It is a response header used by a proxy to negotiate parameters of the credential exchange and to send challenge to the client
    • It is a request header used to pass client’s credentials to a proxy server
    • It is a response header used by an upstream proxy to ask for credentials from a downstream proxy or user agent
  16. Bandwidth minimum does not work in an explicit deployment model.

    • True
    • False
  17. Which method of controlling downloads of certain file types has the LOWEST efficiency in terms of response time, bandwidth use and execution time on ProxySG?

    • Apparent Data Type
    • MIME Type
    • File extension
  18. Which of the following statements are true about Bandwidth Management Hierarchies and Priorities? (Choose all that apply)

    (a) Child classes can have children of their own.

    (b) If no limit is set, packets are sent as soon as they arrive.

    (c) Priorities are set to a class to give precedence over other classes.

    (d) If there is excess bandwidth, the child class will always get the first opportunity to use it.

    • a, b & c only
    • a, b & d only
    • b, c & d only
    • All of the above
  19. Which authentication modes would result in a user-agent receiving a HTTP 401-Unauthorized status codes from the proxy? (Choose all that apply)

    (a) origin-ip-redirect

    (b) proxy-ip

    (c) origin-cookie

    (d) form-cookie-redirect

    • a & b only
    • a & c only
    • b & c only
    • c & d only
    • None of the above
  20. What are the two main functions of configuring forwarding in ProxySG? (Choose all that apply)

    (a) To accelerate application

    (b) Reverse Proxy

    (c) To support Proxy Chaining

    (d) To intercept SSL

    • a & b only
    • b & c only
    • c & d only
    • d & a only
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments