Exam information

Exam BCCPP: Blue Coat Certified Proxy Professional, V.3.5.1

Other exams

Which of the following are true when attempting to deny access to file types?

Which of the following are true when attempting to deny access to file types?

Which of the following steps have to be performed to support Kerberos Authentication?

Which of the following steps have to be performed to support Kerberos Authentication?(Choose all that apply)(a) A virtual URL that resolves to the IP of the ProxySG.(b) Registering the BCAAA as a Service Principal Name.(c) Configuring IWA Realm.(d) Configuring Explicit Proxy.


The ProxySG acts as both an ICAP client and ICAP server.

The ProxySG acts as both an ICAP client and ICAP server.

Which of the following statements are true?

Which of the following statements are true? (Choose all that apply)(a) The SGOS object store utilizes a directory structure so that objects in cache can be accessedrapidly(b) Information about a single object in cache be retrieved from the Management console or theCLI(c) There are two object […]

Which of the following statements are true about Reverse Proxy deployment?

Which of the following statements are true about Reverse Proxy deployment?(Choose all thatapply)(a) Forwarding hosts in the forwarding file must be defined as "server" style(b) Default-scheme in forwarding file is supported(c) Protocol conversion between HTTPS <- ->HTTP are […]

Which of the following statements are true about ProxySG Protocol Detection feature?

Which of the following statements are true about ProxySG Protocol Detection feature?(Choose all that apply)(a) Protocol detection is performed on the server’s response.(b) Protocol detection is performed on the client’s request.(c) Enabling Detect Protocol option will automatically enable […]

What is the effect of the above CPL code?

url.regex=!\.html$ d\ DENYWhat is the effect of the above CPL code?

Which of the following statements are true about dynamic bypass list?

Which of the following statements are true about dynamic bypass list? (Choose all that apply)(a) Configured polices will not be enforced on client request if the request matches an entry in thebypass list.(b) Dynamic bypass entries are lost when ProxySG is restarted(c) If request made to a […]

You can NOT use a self-signed certificate when intercepting SSL traffic.

You can NOT use a self-signed certificate when intercepting SSL traffic.

What criterion is NOT used to determine location awareness of a ProxyClient

What criterion is NOT used to determine location awareness of a ProxyClient

Page 1 of 1012345...10...Last »

Recent Comments