What are two (2) methods by which the ProxySG can detect the type of a file that is downloaded? (Choose two.)
Which VPM layer can be most commonly used to control decrypting of SSL traffic by authenticated username? (Choose the best answer.)
Where does ProxySG object caching usually result in the most bandwidth savings? (Choose the best answer.)
Which log format is associated with the main log facility by default? (Choose the best answer.)
Which log facility is used to log HTTP traffic by default? (Choose the best answer.)
What allows WebPulse to provide real-time revisions to the WebFilter database? (Choose the best answer.)
Which detection method would detect a mismatch between the file name and its content type? (Choose the best answer.)
How can an administrator determine the serial number of the ProxySG in the Management Console? (Choose the best answer.)
When are software workers created during an interaction between a ProxySG and a client requesting a webpage? (Choose the best answer.)
Which kind of authentication credentials might Schannel congestion in IWA direct realms be an issue with? (Choose the best answer.)
Which two (2) methods are able to be used to regain access to the setup console if an administrator loses the password? (Choose two.)
When can more than one authentication realm be active at any given time on the ProxySG? (Choose the best answer.)
Which Symantec product is best suited for simultaneously administering a large number of ProxySG appliances? (Choose the best answer.)
Which proxy service intercepts HTTPS traffic when browsers point directly to the ProxySG and Detect Protocol is enabled? (Choose the best answer.)
Which two (2) files does the VPM update on the ProxySG when policy created in the VPM is installed? (Choose two.)
What should an administrator utilize in policies to specify which traffic should be decrypted? (Choose the best answer.)