BCCPA Dumps BCCPA Braindumps BCCPA Real Questions BCCPA Practice Test

BCCPA Actual Questions


killexams.com BlueCoat BCCPA


Certified Proxy Administrator V3.03


https://killexams.com/pass4sure/exam-detail/BCCPA


QUESTION: 174

Which of the following authentication realms are supported in SGOS version 6.2? (Select all that apply)


  1. RADIUS

  2. LDAP

  3. TACACS+

  4. IWA


Answer: A, B, D


Explanation: http://forums.bluecoat.com/viewtopic.php?f=1&t=18167&sid=3760f809615d799 3d88775fb82e82f4a

https://kb.bluecoat.com/index?page=content&id=FAQ2104


QUESTION: 175

The ProxySG allows you to upload compressed access logs or plain-text access logs.


  1. True

  2. False


Answer: A


Reference: http://wikileaks.org/spyfiles/files/0/268_BLUECOAT- SGOS_Vol8_AccLog_5.3.1.pdf(page 26, first paragraph)


QUESTION: 176

Which one of the following categorization methods is not covered by ProxySG and Blue Coat WebFilter licenses and would incur additional costs?


  1. SurfControl categorization

  2. Local database categorization

  3. WebPulse categorization

  4. IWF categorization


Answer: C


QUESTION: 177

Which one of these statements is true about the factory default settings of a ProxySG?


  1. An unconfigured ProxySG tries to get an IP address from a DHCP server.

  2. Blue Coat Director can be used to assign an IP address to an unconfigured ProxySG.

  3. An IP address can be assigned to an unconfigured ProxySG by using either the serial connection or, on models that have one, the front panel.

  4. An unconfigured ProxySG sends a RARP request to look up its IP address from the MAC address of its network interface card. If it cannot get a valid IP address, initial setup is required.


Answer: C


QUESTION: 178

Persistent TCP connections are enabled by default starting with which version of HTTP?


  1. 1.1

  2. 0.9

  3. 1.0

  4. None of the above


Answer: A


Reference:

http://stackoverflow.com/questions/246859/http-1-0-vs-1-1(see the paragraph with grey background)


QUESTION: 179

Which of the following access logging features are supported by the ProxySG? (Select 4)


  1. Signing, to certify that a particular ProxySG wrote and uploaded the log.

  2. Encryption, to encrypt the data as it is transferred to the remote server.


  3. Logging all user group memberships for the HTTP transactions performed by authenticated users (IWA and LDAP realms).

  4. Compression, to save on data transfer between the ProxySG and the remote server.

  5. Bandwidth management, to facilitate availability of minimum bandwidth for the access log data transfer from ProxySG to the log upload server.


Answer: A, B, C, D


QUESTION: 180

When accessing default administrative account with the ProxySG Management Console, which one of these passwords is used?


  1. Console password

  2. Enable password

  3. Setup Console password

  4. Front panel PIN code


Answer: B


QUESTION: 181

After a URL has been categorized by the WebPulse background rating service, when are the results returned to the ProxySG that initiated the request? (Select all that apply)


  1. At the next scheduled update of the Blue Coat WebFilter database.

  2. Immediately, if the category is Adult or Pornography.

  3. On demand by the ProxySG administrator.

  4. None of the above.


Answer: A, C


QUESTION: 182

Which of the following parts of a URL are NOT case-sensitive? (Select all that apply)


  1. Query parameters


  2. Host name

  3. Protocol name

  4. None of the above


Answer: B


Reference:

http://stackoverflow.com/questions/2148603/is-the-protocol-name-in-urls-case- sensitive


QUESTION: 183

Some models of the ProxySG have a user limit. The user limit is based on which one of these factors?


  1. The number of unique client IP addresses with open inbound TCP connections to the ProxySG.

  2. The specific license that has been purchased for and installed on that ProxySG.

  3. The number of concurrent open TCP connections to the ProxySG.


Answer: A


QUESTION: 184

Proxy servers and firewalls are network security devices that


  1. can be used interchangeably.

  2. complement each other.

  3. are capable of controlling Layer 2 to Layer 7 traffic.

  4. can spoof client IP addresses.


Answer: A, B, C