Which VPM layer can be most commonly used to control decrypting of SSL traffic by authenticated username? (Choose the best answer.)
Answer : C
What are two (2) methods by which the ProxySG can detect the type of a file that is downloaded? (Choose two.)
Answer : C, E
In which type of physical deployment does a ProxySG have potential visibility to all traffic through the use of a device such as WCCP-capable router or a Layer 4 switch? (Choose the best answer.)
Answer : A
What results when the ProxySG bypasses traffic in explicit mode? (Choose the best answer.)
Answer : A
What does the authentication mode specify? (Choose the best answer.)
Answer : A
How does a server know where to retrieve the requested information when it receives a GET request method? (Choose the best answer.)
Answer : B
What is a drawback to utilizing apparent data types to detect the file type? (Choose the best answer.)
Answer : D