image


BCCPA Dumps BCCPA Braindumps BCCPA Real Questions BCCPA Practice Test

BCCPA Actual Questions


BlueCoat


BCCPA


Certified Proxy Administrator V3.03


https://killexams.com/pass4sure/exam-detail/BCCPA


QUESTION: 174

Which of the following authentication realms are supported in SGOS version 6.2? (Select all that apply)


  1. RADIUS

  2. LDAP

  3. TACACS+

  4. IWA


Answer: A, B, D


Explanation: http://forums.bluecoat.com/viewtopic.php?f=1&t=18167&sid=3760f809615d799 3d88775fb82e82f4a

https://kb.bluecoat.com/index?page=content&id=FAQ2104


QUESTION: 175

The ProxySG allows you to upload compressed access logs or plain-text access logs.


  1. True

  2. False


Answer: A


Reference: http://wikileaks.org/spyfiles/files/0/268_BLUECOAT- SGOS_Vol8_AccLog_5.3.1.pdf(page 26, first paragraph)


QUESTION: 176

Which one of the following categorization methods is not covered by ProxySG and Blue Coat WebFilter licenses and would incur additional costs?


  1. SurfControl categorization

  2. Local database categorization

  3. WebPulse categorization

  4. IWF categorization


Answer: C


QUESTION: 177

Which one of these statements is true about the factory default settings of a ProxySG?


  1. An unconfigured ProxySG tries to get an IP address from a DHCP server.

  2. Blue Coat Director can be used to assign an IP address to an unconfigured ProxySG.

  3. An IP address can be assigned to an unconfigured ProxySG by using either the serial connection or, on models that have one, the front panel.

  4. An unconfigured ProxySG sends a RARP request to look up its IP address from the MAC address of its network interface card. If it cannot get a valid IP address, initial setup is required.


Answer: C


QUESTION: 178

Persistent TCP connections are enabled by default starting with which version of HTTP?


  1. 1.1

  2. 0.9

  3. 1.0

  4. None of the above


Answer: A


Reference:

http://stackoverflow.com/questions/246859/http-1-0-vs-1-1(see the paragraph with grey background)


QUESTION: 179

Which of the following access logging features are supported by the ProxySG? (Select 4)


  1. Signing, to certify that a particular ProxySG wrote and uploaded the log.

  2. Encryption, to encrypt the data as it is transferred to the remote server.


  3. Logging all user group memberships for the HTTP transactions performed by authenticated users (IWA and LDAP realms).

  4. Compression, to save on data transfer between the ProxySG and the remote server.

  5. Bandwidth management, to facilitate availability of minimum bandwidth for the access log data transfer from ProxySG to the log upload server.


Answer: A, B, C, D


QUESTION: 180

When accessing default administrative account with the ProxySG Management Console, which one of these passwords is used?


  1. Console password

  2. Enable password

  3. Setup Console password

  4. Front panel PIN code


Answer: B


QUESTION: 181

After a URL has been categorized by the WebPulse background rating service, when are the results returned to the ProxySG that initiated the request? (Select all that apply)


  1. At the next scheduled update of the Blue Coat WebFilter database.

  2. Immediately, if the category is Adult or Pornography.

  3. On demand by the ProxySG administrator.

  4. None of the above.


Answer: A, C


QUESTION: 182

Which of the following parts of a URL are NOT case-sensitive? (Select all that apply)


  1. Query parameters


  2. Host name

  3. Protocol name

  4. None of the above


Answer: B


Reference:

http://stackoverflow.com/questions/2148603/is-the-protocol-name-in-urls-case- sensitive


QUESTION: 183

Some models of the ProxySG have a user limit. The user limit is based on which one of these factors?


  1. The number of unique client IP addresses with open inbound TCP connections to the ProxySG.

  2. The specific license that has been purchased for and installed on that ProxySG.

  3. The number of concurrent open TCP connections to the ProxySG.


Answer: A


QUESTION: 184

Proxy servers and firewalls are network security devices that


  1. can be used interchangeably.

  2. complement each other.

  3. are capable of controlling Layer 2 to Layer 7 traffic.

  4. can spoof client IP addresses.


Answer: A, B, C


image

6$03/( 48(67,216


7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV


.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP


$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP


([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP


3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV


*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV


8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV


7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\


'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU

.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG