Documentos de Académico
Documentos de Profesional
Documentos de Cultura
https://www.testschamp.com/BCCPP.html
Version: 9.1
Question: 1
Which of the following are true when attempting to deny access to file types?
A. MIME type objects are matched against the Content-type request header; File Extension objects are
matched against the GET response header; Apparent Data Type objects are matched against request
data.
B. MIME type objects are matched against the Content-type response header; File Extension objects are
matched against the GET request header; Apparent Data Type objects are matched against response
data.
C. MIME type objects are matched against the Content-encoding response header; File
Extension objects are matched against the GET request header; Apparent Data Type objects are matched
against response data.
D. MIME type objects are matched against the Content-type response header; File Extension objects are
matched against the GET request header; Apparent Data Type objects are matched against request data.
Answer: C
Question: 2
Answer: D
Question: 3.
Which of the following statements are true? (Choose all that apply)
(a) The SGOS object store utilizes a directory structure so that objects in cache can be accessed rapidly
(b) Information about a single object in cache be retrieved from the Management console or the CLI
(c) There are two object caches, the object cache which resides on disk and the object cache which
resides in RAM
(d) The SGOS object store is separated by protocol (HTTP cache, FTP cache, etc.)
A. a, b & c only
B. a, c & d only
C. b, c & d only
D. All of the above
Answer: A
Question: 4
A. True
B. False
Answer: A
Question: 5
Which of the following statements are true about Reverse Proxy deployment?(Choose all that apply)
(a) Forwarding hosts in the forwarding file must be defined as "server" style
(b) Default-scheme in forwarding file is supported
(c) Protocol conversion between HTTPS <- ->HTTP are automatic
(d) ProxySG should be set with default DENY policy
A. a, b & c only
B. a, c & d only
C. b, c & d only
D. All of the above
Answer: B
Question: 6
Which of the following statements are true about ProxySG Protocol Detection feature?
(Choose all that apply)
(a) Protocol detection is performed on the server's response.
(b) Protocol detection is performed on the client's request.
(c) Enabling Detect Protocol option will automatically enable early intercept attribute in proxy services.
(d) Protocol detection is performed by looking at the TCP port number.
A. a & b only
B. b & c only
C. c & d only
D. ALL of the above
Answer: D
Question: 7
url.regex=!\.html$ d\ DENY
What is the effect of the above CPL code?
Answer: B
Question: 8
Which of the following statements are true about dynamic bypass list? (Choose all that apply)
(a) Configured polices will not be enforced on client request if the request matches an entry in the
bypass list.
(b) Dynamic bypass entries are lost when ProxySG is restarted
(c) If request made to a site in a forwarding policy is in the bypass list, the site is inaccessible
(d) Dynamic bypass parameters can be configured on Management Console and CLI.
Answer: B
Question: 9
You can NOT use a self-signed certificate when intercepting SSL traffic.
A. True
B. False
Answer: B
Question: 10
A. IP address range
B. Virtual NICs IP address range
C. The IP address of the closest AND concentrator
D. DNS server IP address
Answer: C
Question: 11
Which method of controlling downloads of certain file types works fastest on ProxySG?
Answer: C
Question: 12
Answer: B
Question: 13
Which of the following hostnames are NOT matched by the regular expression “www (0 9) (0-9)? \ .foo\
.com”)
A. www.foo.com
B. www01.foo.com
C. www1.foo.com
D. www11.foo.com
Answer: A
Question: 14
The Content-encoding header is used to declare the MIME type and compression method used in a HTTP
response.
A. True
B. False
Answer: A
Question: 15
Which of the following are obvious advantages of having a ProxySG deployed in a Reverse Proxy
environment? (Choose all that apply)
(a)The ProxySG has built in DOS protection to guard the actual web server from denial-ofservice attacks
(b) Increased performance with caching provides an improved Web Experience
(c) Consistent default behavior of cache expiration and validation directives
(d) SSL termination on ProxySG allow SSL offloading, therefore eliminating bottleneck on the web server
side.
Answer: C
Question: 16
Which of these are the features of a Blue Coat Director? (Choose all that apply)
(a) Install and update configurations of a group of ProxySG
(b) Distribute and control content of a group of ProxySG
(c) Managing SSL VPN configuration
(d) Monitoring ProxySG Performance
A. a, b & c only
B. a, b & d only
C. b, c & d only
D. a, c & d only
Answer: B
Question: 17
Which client deployment methods support the 407 Proxy Authentication Required response code?
(Choose all that apply)
(a) Proxy Auto Configuration files
(b) WCCP
(c) Proxy settings in browser
(d) Inline Bridging
A. a & b only
B. b & c only
C. c & d only
D. a & c only
E. All of the above
Answer: D
Question: 18
After creating CPL in the local policy file, the policy is imported into the VPM CPL file so that it can be
viewed through the Visual Policy Manager.
A. True
B. False
Answer: A
Question: 19
With ProxySG failover, the failover Virtual IP address can be the same as the IP address assigned to the
master.
A. True
B. False
Answer: B
Question: 20
ProxySG is configured to permit error but guest authentication is not configured. What will happen to a
user who initiates a connection to the Internet?
Answer: A