Under which conditions does a policy-driven trace generate a trace? (Choose the best answer.)
What must the virtual URL point to, when the ProxySG utilizes a virtual URL for user authentication in a transparent deployment? (Choose the best answer.)
Which diagnostic tool allows an administrator to examine how the ProxySG has applied policy to a particular request? (Choose the best answer.)
Where does ProxySG object caching usually result in the most bandwidth savings? (Choose the best answer.)
Which detection method would detect a mismatch between the file name and its content type? (Choose the best answer.)
Which log facility is used to log HTTP traffic by default? (Choose the best answer.)
How does a server know where to retrieve the requested information when it receives a GET request method? (Choose the best answer.)
Which kind of authentication credentials might Schannel congestion in IWA direct realms be an issue with? (Choose the best answer.)
How do policy checkpoints evaluate the installed policy on a ProxySG? (Choose the best answer.)
Which proxy service intercepts HTTPS traffic when browsers point directly to the ProxySG and Detect Protocol is enabled? (Choose the best answer.)
When will a policy trace report a rule processing result of “N/A”? (Choose the best answer.)
Which deployment method represents a single point of failure? (Choose the best answer.)
Which two (2) methods are able to be used to regain access to the setup console if an administrator loses the password? (Choose two.)
What is typically the biggest load on a CPU when managing encrypted traffic? (Choose the best answer.)
What allows WebPulse to provide real-time revisions to the WebFilter database? (Choose the best answer.)
Which section of the sysinfo file would persistent data manager (PDM) information be found within? (Choose the best answer.)