Which of the following policies can be applied to Instant Messaging traffic? (Choose all thatapply)
(a) A policy to deny the transfer of specific file types or file sizes
(b) A policy to deny a specific IM request method
(c) A policy to deny a key word or words using a regular expression
(d) A policy to deny a specific IM buddy or IM chat room
Correct Answer:
A
Reference:http://download.cacheflow.com/manuals/SGOS3/ProxySG_CMG_Guide_3.1.4.p df(page 438, 439, 440, 441)
What are the four types of VPNtrigger objects? (Select 4)
Correct Answer:
DEF
On the ProxySG, can more than one authentication realm be active at any given time?
Correct Answer:
A
Reference:https://bto.bluecoat.com/doc/9102(page 8, controlling user access, second para)
What changes, when FIPS mode for Management Console is enabled?
Correct Answer:
B
In which type of physical deployment is a ProxySG out of path but still has potential visibility to all traffic through the use of a device such as a WCCP-capable router or a Layer 4 switch?
Correct Answer:
C