BCCPP

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

When Using the ProxySG to send Information related to a service request,

which these items can the ProxySG transmit to Bluecoat?


Packet Capture, Memory core dump, Policy trace, Sysinfo file, Event log
Which one of these statements is NOT true about the ProxySG object cache?
The first chunk of any object can be retrieved in a single disk-read operation
If a CPL rule is not part of a policy layer, when is it processed?
This cannot happen. All rules must be part of a layer.
Which of these policy files is processed first?
Threat protection policy file
In a typical client, HTTP request, identify the four principal policy checkpoints
in the order they are reached:
Client in, Server out, Server in, Client out
If a CPL rule contains more than one trigger, how are the triggers evaluated?
They are logically ORed together; any one of them must be true for the rule to match.

True or false: An excessively high internal CPU temperature can be detected


and reported by the ProxySG.
True
What factors determine the overall state of the ProxySG health monitor?
Hardware Status, Resource utilization, Licensing status, Health Checks
What happens when a disk is removed from a ProxySG while it is running?
The objects on the removed disk are automatically remapped to the remaining disks and
are prefetched from the appropriate content servers the next time they are requested
Which Blue Coat product is best suited for simultaneously administering a
large number of ProxySG appliances?
Director
Which one of these statements best describe how policy checkpoints
evaluate the installed policy on a ProxySG?
Relevant rules are evaluated at each checkpoint based on the information about the
transaction that is available at that point
When performing a packet capture of traffic that is seen by a ProxySG
between a client and server, what is the main advantage of performing the
capture on the ProxySG rather than on a client?
Both Client-side and Server-side traffic are visible
If a user agent that does not support authentication tries to request content
though a connection on which the ProxySG requires authentication, how can
you best resolve the issue?
Identify an HTTP header that identifies the user agent, and then write policy to exempt
matching transactions from authentication
Where can you can get the SNMP MIBs for the version of SGOS running on
your ProxySG?
Blue Touch Online
What type of filesystem does SGOS use?
None of the above
What information is stored in a policy trace for a transaction processed by a
proxy service that is set to Bypass?
None of the above, no entry is recorded in the policy trace
If cookies surrogates are used with a user agent that does not support
cookies, how does the ProxySG respond?
The ProxySG repeatedly tries to authenticate until the user agent gives up, and
authentication is not successful.
Which one of these statements is NOT true about the caching architecture of
the ProxySG?
The object store uses a directory structure so that objects in the cache can be accessed
quickly.
A Web Authentication layer in the VPM can be best implemented in which
type of policy layer in CPL?
Proxy
Which one of these statements is NOT true about the caching architecture of
the ProxySG?
The object store uses a directory structure so that objects in the cache can be accessed
quickly.
If the ProxySG and a client cannot successfully authenticate the use of
Kerberos credentials during authentication in a realm where use of Kerberos
credentials is enabled, what happens to the authentication request?
The request automatically downgrades to use NTLM credentials. If NTLM credentials also
fail, then Basic credentials are used.
Which one of the following test one aspect of a request against a Boolean
expression of values?
Triggers
In which two of these cases must you specify a virtual URL to be used in
conjunction with Kerberos authentication?
Transparent proxy connection, A redirect authentication mode.

In a hybrid configuration using the ProxySG in conjunction with the Blue


Coat Cloud Service Web Security Module, how does the ProxySG determine
when content filtering should be processed by the Cloud Service and not the
ProxySG?
Selective forwarding must be configured on the ProxySG
The ProxySG simultaneously opens multiple server connections to retrieve
objects referenced on a web page before the client actually issues the
requests for those objects. This statement best describes which ProxySG
caching technique?
Pipelining

Without asking a user or physically inspect their computer, how can you
determine which version of web browser they have used to make requests
that are intercepted by the ProxySG?
By performing packet captures on the ProxySG when that web browser is in use, by
inspecting the ProxySG access log, if access logging is enabled.

When a ProxySG is configured to use authentication mode auto with


Kerberos credentials and a transparent proxy connection, which actual mode
is typically used?
Origin cookie redirect
Which one of these statements best describes how does the ProxySG locate
an object in its cache??
The ProxySG performs a hash against the URL of the object and uses the hash as the basis
for a lookup into the table of cached objects
True or false: A policy trace can be enabled for any layer type.
True
What stops further rule processing in a layer?
The first rule in the layer that matches.
Name two ways by which the ProxySG can determine that DDoS attack in
progress.
Excessive number of HTTP connections from a client, excessive number of requests from a
specific server.
If you create a configuration archive on a ProxySG, how can you restore that
archive onto a different ProxySG?
The SSL keyring configuration-passwords-key must be saved on the source and restored at
the destination.
Which policy file can be automatically updated when the ProxySG detects
changes to an external source?
The threat protection policy file.
Which Blue Coat product is best suited for scanning network traffic to detect
viruses?
ProxyAV
When will a policy trace report a rule processing result for "N/A"?
When the rule makes no sense for the specific transaction being processed
The HTTP request header Pragma: no-cache performs the same function as
what other header?
Cache-control: no-cache directive

You might also like