Which VPM layer can be most commonly used to control decrypting of SSL traffic by authenticated username? (Choose the best answer.)
Answer : C
What is a series of sysinfo files gathered at periodic intervals called? (Choose the best answer.)
Answer : C
Which section of the sysinfo file displays information such as the number of successes and failures? (Choose the best answer.)
Answer : D
Where can an administrator create a new built-in exception on the ProxySG? (Choose the best answer.)
Answer : A
When can more than one authentication realm be active at any given time on the ProxySG? (Choose the best answer.)
Answer : D
How does a server know where to retrieve the requested information when it receives a GET request method? (Choose the best answer.)
Answer : B
What is a drawback to utilizing apparent data types to detect the file type? (Choose the best answer.)
Answer : D