1.
Which one of these statements best describes how policy checkpoints evaluate the installed policy on a ProxySG?
2.
What are the three levels of the ProxySG authentication cache? (Select 3)
3.
In CPL, rules that have similar syntax can be grouped into what?
4.
When one ProxySG forwards HTTP requests to another ProxySG, does the originating ProxySG send a server-style GET request or a proxy-style GET request?
5.
If the ProxySG and a client cannot successfully authenticate the use of Kerberos credentials during authentication in a realm where use of Kerberos credentials is enabled, what happens to the authentication request?
6.
An HTTP request containing which header instructs the content server to return whether the requested object has been modified since the last visit?
7.
SGOS is based on which other operating system?
8.
What type of filesystem does SGOS use?
9.
When a downstream ProxySG requests an object that already is cached in an upstream ProxySG, the downstream ProxySG checks the object's freshness with the origin content server.
10.
If a user agent that does not support authentication tries to request content through a connection on which the ProxySG requires authentication, how can you best resolve the issue?