How do policy checkpoints evaluate the installed policy on a ProxySG? (Choose the best answer.)
Answer : C
Which diagnostic tool allows an administrator to examine how the ProxySG has applied policy to a particular request? (Choose the best answer.)
Answer : A
What happens when the ProxySG discovers a match for a rule in policy? (Choose the best answer.)
Answer : A
Which two (2) methods are able to be used to regain access to the setup console if an administrator loses the password? (Choose two.)
Answer : B, D
What is the primary benefit of using Integrated Windows Authentication (IWA) authentication realms? (Choose the best answer.)
Answer : A
What must the virtual URL point to, when the ProxySG utilizes a virtual URL for user authentication in a transparent deployment? (Choose the best answer.)
Answer : C
In which caching technique are objects that require more server-side bandwidth and response time less likely to be deleted from the cache? (Choose the best answer.)
Answer : D