Which two (2) categories of traffic are typically left encrypted? (Choose two.)
A. Gambling
B. News Media
C. Social Media
D. Financial Services
E. Health
Which type of object is a Notify User object in the VPM? (Choose the best answer.)
A. Destination
B. Action
C. Track
D. Source
Which two (2) situations might require a reverse DNS lookup? (Choose two.)
A. If the access log is enabled and a field in the access log requires a hostname
B. If both the primary and alternate forward DNS servers go down
C. If primary authentication fails
D. If a policy trigger event requires it
E. If a forward DNS lookup fails
Which service setting determines whether the traffic is passed to the SSL proxy or the HTTP proxy when a browser is configured to use an explicit proxy connection to the ProxySG? (Choose the best answer.)
A. Enable SSL/TLS
B. Detect protocol
C. Authenticate-401
D. Forward client cert
Which Symantec product is best suited for simultaneously administering a large number of ProxySG appliances? (Choose the best answer.)
A. PacketShaper
B. Reporter
C. Management Center
D. Content Analysis
How does a network administrator access sysinfo files? (Choose the best answer.)
A. Through the CLI
B. Through the Management Console
C. By creating a sysinfo layer in the VPM
D. Through the use of an advanced URL in a browser
Which two (2) items are considered external dependencies? (Choose two.)
A. Policy
B. DNS
C. CPU
D. Authentication
E. Memory
What does the authentication mode specify? (Choose the best answer.)
A. The challenge type and the accepted surrogate
B. The protocol used to communicate with the authentication server
C. The time-to-live for credentials
D. Whether the credentials will be encrypted
Which two (2) environments will IP surrogate credentials NOT work in? (Choose two.)
A. With devices that use Network Address Translation
B. Out-of-path deployments
C. Transparent deployments
D. Explicit deployments
E. Multi-user environments such as Citrix
How do policy checkpoints evaluate the installed policy on a ProxySG? (Choose the best answer.)
A. At each checkpoint, a decision is made whether to allow or deny the transaction
B. The Server In checkpoint decides which rules will be evaluated by the other checkpoints
C. Relevant rules are evaluated at each checkpoint based on the information about the transaction that is available at that point
D. The Client In checkpoint decides which rules will be evaluated by the other checkpoints