1.
By default, HTTP traffic that is logged is recorded to which log facility?
2.
Which Symantec product is best suited for simultaneously administering a large number of ProxySG appliances?
3.
What stops further rule processing in a layer?
4.
When the ProxySG uses a virtual URL for user authentication, what must the virtual URL point to?
5.
Why is Kerberos performance better than NTLM?
6.
Which services are included in the Intelligence Services Advanced Bundle?
7.
When does the ProxySG establish an Schannel?
8.
Which of the following is not a VPM trigger object?
9.
Name three methods by which client configuration can be performed in an explicit ProxySG deployment.
10.
If you have configured continuous uploading of access logs and the ProxySG is unable to reach the upload destination, what happens to the log entries?