Which two (2) items are considered external dependencies? (Choose two.)
Answer : B, D
Which service setting determines whether the traffic is passed to the SSL proxy or the HTTP proxy when a browser is configured to use an explicit proxy connection to the ProxySG? (Choose the best answer.)
Answer : B
Which section of a policy trace would an administrator locate the original HTTP GET request in? (Choose the best answer.)
Answer : D
What is the primary benefit of using Integrated Windows Authentication (IWA) authentication realms? (Choose the best answer.)
Answer : A
What is the default TCP port for HTTP? (Choose the best answer.)
Answer : C
Which two (2) services are provided by the ProxySG? (Choose two.)
Answer : C, D
In which caching technique are objects that require more server-side bandwidth and response time less likely to be deleted from the cache? (Choose the best answer.)
Answer : D