Which is the default TCP port for HTTP?
Which is the default TCP port for HTTP?A . 20B . 80C . 443D . 43View AnswerAnswer: B Explanation: Reference: https://support.symantec.com/en_US/article.TECH242551.html
Which is the default TCP port for HTTP?A . 20B . 80C . 443D . 43View AnswerAnswer: B Explanation: Reference: https://support.symantec.com/en_US/article.TECH242551.html
What can proxy servers do? (Choose three.)A . Rewrite request messagesB . Interpret request messagesC . Block malicious contentD . Scan traffic for virusesView AnswerAnswer: ACD Explanation: Reference: https://origin-symwisedownload.symantec.com/resources/webguides/proxysg/ security_first_steps/Content/PDFs/Malware_Prevention_Solution.pdf
Which services are included in the Intelligence Services Advanced Bundle?A . Content categoriesB . Threat risk levelsC . All of theseD . GeolocationView AnswerAnswer: C Explanation: Reference: https://www.symantec.com/products/webfilter-intelligent-services
If you have configured continuous uploading of access logs and the ProxySG is unable to reach the upload destination, what happens to the log entries?A . They are uploaded in real time to the...
From the connection information section of a policy trace, you can see:A . The time and dateB . The source IP addressC . All of these answersD . The original HTTP GET requestView AnswerAnswer:...
When will a policy trace report a rule processing result of “N/A”?A . When the rule is not reached during evaluationB . When the rule makes no sense for the specific transaction being processedC...
By default, HTTP traffic that is logged is recorded to which log facility?A . bcreportermain_v1B . mainC . elfD . httpView AnswerAnswer: B Explanation: Reference: https://wikileaks.org/spyfiles/files/0/241_BLUECOAT-SGOS_CMG_5.1.4_9.pdf (p.7)
In which type of physical deployment does a ProxySG have potential visibility to all traffic through the use of a device such as a WCCP-capable router or a Layer 4 switch?A . TransparentB ....
How does the Management Console perform commands on the ProxySG?A . None of these answersB . By using proprietary APIs to perform function calls on the ProxySGC . By using Content Policy Language to...
Why is Kerberos performance better than NTLM?A . It uses less encryptionB . None of these answersC . Only two round trips are required between the browser and an authentication serverD . It works...