Blue Coat

Blue Coat Certified Proxy Administrator V3.03
Full versionis available at link below with affordable price.

Edition = DEMO

Full Version Features:

90 Days Free Updates
30 Days Money Back Guarantee
Instant Download Once Purchased
24 Hours Live Chat Support

Question: 1
An administrator created a PIN for the ProxySG front panel, disabled the built-in administrative
account and introduced policy-based admin authoritarian, and secured die serial port. After this was
done, all the PINs, passwords and policy settings were lost. What options are available to regain
access to the appliance? (Choose all that apply)
(a) Return ProxySG appliance to Blue Coat to restore a default SGCS image
(b) Restore the factory settings by pressing and holding a reset button for 5 seconds, configure the
appliance anew or restore its configuration from a backup
(c) Try out all 10000 combinations of PIN for the front panel until you find the right one
(d) Remove the hard disk from the ProxySG, connect it as an external SAT A disk to any
Windows or Linux computer; clear the admin entry in the /etc/ pssswd file on that disk. Put the hard
disk back in ProxySG, start it up and reset the admin's password.
A. a only
B. a & b only
C. a & c only
D. a & d only
E. All of the above

Answer: B
Question: 2
The Connect HTTP method is reserved for use with a proxy that can dynamically switch to being a
tunnel (e.g. SSL tunneling)
A. True
B. False

Answer: A
Question: 3
Forward proxy of SSL allows applying policies to encrypted SSL data.
A. True
B. False

Answer: B
pg. 2

Reference: (last paragraph)

Question: 4
The ProxySG gives you the ability to write policies through.
A. the graphical visual Policy Manager and/or the command-line interface
B. Visual Policy Manager only
C. the graphical visual Policy Manager, the command-line interface and/or imported text file

Answer: C
Question: 5
Which is NOT a support- related site for Blue Coat products?

Answer: D
Question: 6
Which ProxySG technology uses the data processing pipeline similar to the one shown in the

A. Blue Coat Reporter
D. ProxySG Services

Answer: B
pg. 3


Question: 7
Which of the following Authentication Realms are supported by Blue Coat in SGOS 5.3? (Choose all
that apply)
(a) IWA
A. a, b & d only
B. b, c & d only
C. a, b &c only
D. All of the above

Answer: C
Question: 8
What are the possible configurable options when configuring destination address in proxy services?
(Choose all that apply)
(a) All
(b) Any
(c) Explicit
(d) Transparent
A. a, c & d only
B. a, b & c only
C. b, c &d only
D. All of the above

Answer: A
Question: 9
What are the types of challenges that can be authenticated by ProxySG? (Choose all that apply)
(a) Administrator attempts to access Management console
(b) user attempts to access the internet
pg. 4

(c) Administrator attempts to access SG via SSH
(d) User attempts to access a CIFS file server
A. All of the above
B. b, c &d only
C. a, c & d only
D. a, b & c only

Answer: D
Explanation: Administrator doesn’t need to use authentication by ProxySG to access its own
management console. The authentication used is a username password to access Management

Question: 10
A ProxySG is designed to do which of the following? (Choose all that apply)
(a) Enhance security through authentication, virus scanning, and logging.
(b) Increase performance through TCP optimization, HTTP caching and pipelining.
(c) Control content with URL filtering, content stripping, and HTTP header analysis.
A. a & b only
B. b & c only
C. a & c only
D. All of the above

Answer: D
(first page entirely.)

Question: 11
Which streaming services are supported by ProxySG?
A. QuickTime, Windows Media, and Real Media
B. Windows Media, Real Media, and Flash
C. QuickTime, Flash, and MP4
pg. 5

Answer: B

Question: 12
A single ProxySG appliance can act as a Gateway Proxy and WAN Acceleration Proxy at the same
A. True
B. False

Answer: A
Explanation: (forward proxy,
second paragraph; example 3, third page)

Question: 13
Which option is NOT available to upload logfiles from ProxySG?
A. HTTP server
B. FTP server
C. Blue Coat Reporter server
D. CIFS/SAMBA file server

Answer: D

Question: 14
What acceleration techniques are NOT part of MACHS?
A. Bandwidth management (traffic shaping)
B. Protocol optimization and compression
C. IP layer route optimization
D. Object caching
E. Byte caching
pg. 6

Answer: C

Question: 15
Which of the following types of traffic are not scanned with ICAP REQMOD?
B.FTP uploads
C.FTP responses

Answer: C
Question: 16
The goal of creating and using Notify User objects is (Choose all that apply)
(a) to deny access to a URL
(b) to deliver a splash page to the clients
(c) to warn a user before allowing access to a URL
A. a & b only
B. b & c only
C. All of the above

Answer: B
pg. 7

For More Information:
pg. 8

Master your semester with Scribd & The New York Times

Special offer for students: Only $4.99/month.

Master your semester with Scribd & The New York Times

Cancel anytime.