1.
Which statement is correct about Proxy-Authenticate header
2.
Who plays the role of the trusted third party, when client and server communicate via Kerberos?
3.
Log format variable s-ip always refers to
4.
What is a precondition for using L2 MAC rewrite with WCCP?
5.
A policy trace can be enabled for any layer type.
6.
Which regular expression should you test against a URL to match both http and https schemes?
7.
The ProxySG is intercepting Flash traffic. Client A requests an on-demand 100MB Flash video and watches the first 50MB of it before terminating the media player. Client B requests the same on-demand Flash video, starts at the 25MB mark, and plays the remainder of the video. In normal conditions without any policy specifically controlling caching, how is the video served to Client B?
8.
Is it possible to run more than one version of a BCAAA processor on a Windows computer?
9.
Where can you get the SNMP MIBs for the version of SGOS running on your ProxySG?
10.
In an SSL transaction in which the server's certificate is not from a trusted authority, which entity generates the warning that is displayed in a web browser?