BCCPP - Blue Coat Certified Proxy Professional, V.3.5.1

Go back to BlueCoat

Example Questions

When creating a policy-driven trace, which CPL property specifies the name of the policy trace file into which matching transactions are traced? A Web Authentication layer in the VPM can be best implemented in which type of policy layer in CPL? Which of these are the features of a Blue Coat Director? (Choose all that apply) (a) Install and update configurations of a group of ProxySG (b) Distribute and control content of a group of ProxySG (c) Managing SSL VPN configuration (d) Monitoring ProxySG Performance What is the meaning of the metacharacter \ (backslash) in regular expressions? The Access Control List (ACL) option in the management console (configured by the menu item Configuration >Authentication >Console access) will be enforced for which types of administrative accounts? (Choose all that apply) (a) LDAP realm account (b) Local realm account (c) Built-in account (d) IWA realm account Which types of requests are likely to be served the fastest? When will a policy trace report a rule processing result of "N/A"? What criterion is NOT used to determine location awareness of a ProxyClient Which of these proxy services must be enabled on the ProxySG to allow communication with an SNMP server? Which of the following format can be used in troubleshooting authortization and authorization related problems in ProxySG? (Choose all that apply) (a) x-sc-authentication-error (b) x-sc-authentication-timeout (c) x-sc-authorlzation-error (d) x-sc-authorization-timeout Log format variable s-ip always refers to Which of the following statements are true? (Choose all that apply) (a) The SGOS object store utilizes a directory structure so that objects in cache can be accessed rapidly (b) Information about a single object in cache be retrieved from the Management console or the CLI (c) There are two object caches, the object cache which resides on disk and the object cache which resides in RAM (d) The SGOS object store is separated by protocol (HTTP cache, FTP cache, etc.) http://support.bluecoat.com/products/proxysg/sg9000.html?customer=123 For the above URL, will the trigger url.domain=bluecoat.com match or miss? At which checkpoint does the rewrite () perform the TWURL modification? What is the protocol used for Blue Coat Director to communicate with ProxySG? What are the two functions of configuring forwarding in ProxySG? (Choose all that apply) Hostname of the BCAAA= serverl DNS suffix =bluecoat.com Hostname of the Bluecoat SG = sgo1 Referring to the above information, what is the correct syntax for the SPN command in the Domain Controller? When the ProxySG determines whether a user is a member of an LDAP group, is that considered authentication or authorization? How must you configure the RTMP proxy service to process Flash traffic originating at youtube.com? Apparent Data Type objects can be created in the VPM for which of the following file types? (Choose all that apply) (a) Windows DLL (b) Windows Exe (c) Windows Ocx (d) Windows Cab When a user has credentials in an IWA realm and already has been authenticated into that realm, what happens when CPL code directs that user to be authenticated as a guest? By default, what type of authentication challenge will the user-agent receive if the authentication node is set to AUTO? After creating CPL in the local policy file, the policy is imported into the VPM CPL file so that it can be viewed through the Visual Policy Manager. On the ProxySG, where can you specify whether a client is permitted to allow an untrusted server certificate? (Select all that apply) Which one of these statements is NOT true about the caching architecture of the ProxySG? CPL is required when creating which types of policy? The ProxySG is intercepting Flash traffic. Client A requests an on-demand 100MB Flash video and watches the first 50MB of it before terminating the media player. Client B requests the same on-demand Flash video, starts at the 25MB mark, and plays the remainder of the video. In normal conditions without any policy specifically controlling caching, how is the video served to Client B? Name two ways by which the ProxySG can determine that a DDOS attack is in progress. (Select 2) Name two settings that can be configured in a forwarding group to define which hosts in the group receive traffic. (Select all that apply) What type of filesystem does SGOS use? Who plays the role of the trusted third party, when client and server communicate via Kerberos? Without asking a user or physically inspecting their computer, how can you determine which version of web browser they are using to make requests that are intercepted by the ProxySG? (Select all that apply) In a typical client HTTP request, identify the four principal policy checkpoints in the order they are reached. After creating CPL in the local policy file, the ProxySG imports the policy into the VPM-CPL file so that it can be viewed in the Visual Policy Manager. When creating policy in the VPM, where can you instruct the ProxySG to enable or disable pipelining of referenced objects? The ProxySG ICAP implementation is fully compatible with which of the following applications? (Choose all that apply) (a) Finjan SurfinGate (b) Webwasher (c) AntiVirus Scan Engine (SAVSE) (d) Trend Micro InterScan By, default is a Forwarding layer in the VPM processed before or after a Web Access layer? In Kerberos authentication that uses BCAAA, which two entities negotiate the shared key that is used during the authentication? (Select 2) What type of SGOS software worker can be invoked to perform pipelining of HTTP requests? Which regular expression should you test against a URL to match both http and https schemes? Which of the following are the benefits of using Bandwidth Management with the ProxySG (Choose all that apply) (a) Ensuring mission critical application receives minimum amount of bandwidth (b) Compressing certain type of traffic classes before transmitting it over the WAN (c) Prioritizing certain traffic classes (d) Rate limiting application to prevent "hogging" of network bandwidth. SGOS is based on which other operating system? What type of authentication challenge is issued when using the Policy Substitution Realm? Health checks are automatically created under which scenarios? (Choose all that apply) (a) When a forwarding host is created. (b) When a failover group is created. (c) When the DRTR is enabled. (d) When a SOCKS gateway is created. When creating a TCP tunnel service in explicit mode, you must also configure a forwarding host? With ProxySG failover, the failover Virtual IP address can be the same as the IP address assigned to the master. Which of the following access log formats are supported by the ProxySG? (Choose all that apply) (a) ELFF (b) SQUID (c) Websense (d) NCSA An HTTP request containing which header instructs the content server to return whether the requested object has been modified since the last visit? True or false: The ProxySG can apply policy to Flash traffic without requiring the installation of an add-on license. Which of these must be specified on a ProxySG to enable its access logs to be used by Blue Coat Reporter? (Select all that apply)