Which of the following are true when attempting to deny access to file types?
Correct Answer:
C
🗳️
Which of the following steps have to be performed to support Kerberos Authentication?
(Choose all that apply)
(a) A virtual URL that resolves to the IP of the ProxySG.
(b) Registering the BCAAA as a Service Principal Name.
(c) Configuring IWA Realm.
(d) Configuring Explicit Proxy.
Correct Answer:
D
🗳️
Which of the following statements are true? (Choose all that apply)
(a) The SGOS object store utilizes a directory structure so that objects in cache can be accessed rapidly
(b) Information about a single object in cache be retrieved from the Management console or the CLI
(c) There are two object caches, the object cache which resides on disk and the object cache which resides in RAM
(d) The SGOS object store is separated by protocol (HTTP cache, FTP cache, etc.)
Correct Answer:
A
🗳️
The ProxySG acts as both an ICAP client and ICAP server.
Correct Answer:
A
🗳️
Which of the following statements are true about Reverse Proxy deployment? (Choose all that apply)
(a) Forwarding hosts in the forwarding file must be defined as "server" style
(b) Default-scheme in forwarding file is supported
(c) Protocol conversion between HTTPS <- ->HTTP are automatic
(d) ProxySG should be set with default DENY policy
Correct Answer:
B
🗳️