In which of the following ways can Access Logging be enabled? (Choose all that apply.)
(a) By a CLI command
(b) In the Management Console under Access Logging
(C) By adding another layer to VPM policy
Which of the following cashing techniques utilize retrieval workers to keep the contents of the cache fresh? (Choose all that apply.)
(a) Cost-based Deletion
(b) Asynchronous Adaptive Refresh
(c) Popularity Contest
Which server certificate validation errors can be ignored within ProxySG policy? (Choose all that apply)
(a) Untrusted issuer
(b) Host name mismatch
(c) Expiration
What are the possible ways of creating bandwidth classes?
(a) Using Management Console
(b) Defining them in a JavaScript file and uploading it to ProxySG
(c) Using CLI
What are the two main functions of configuring forwarding in ProxySG? (Choose all that apply)
(a) To accelerate application
(b) Reverse Proxy
(c) To support Proxy Chaining
(d) To intercept SSL
Which authentication modes would result in a user-agent receiving a HTTP 401-Unauthorized status codes from the proxy? (Choose all that apply)
(a) origin-ip-redirect
(b) proxy-ip
(c) origin-cookie
(d) form-cookie-redirect