image


BCCPP Dumps BCCPP Braindumps BCCPP Real Questions BCCPP Practice Test

BCCPP Actual Questions


BlueCoat


BCCPP


Blue Coat Certified Proxy Professional


https://killexams.com/pass4sure/exam-detail/BCCPP


Question: 201


Which method of controlling downloads of certain file types works fastest on ProxySG?

  1. Apparent Data Type

  2. MIME Type

  3. File extension


Answer: C


Question: 202


Which of the following statements are true about ProxySG Protocol Detection feature? (Choose all that apply)

  1. Protocol detection is performed on the server’s response.

  2. Protocol detection is performed on the client’s request.

  3. Enabling Detect Protocol option will automatically enable early intercept attribute in proxy services.

  4. Protocol detection is performed by looking at the TCP port number.

  1. a & b only

  2. b & c only

  3. c & d only

  4. ALL of the above


Answer: D


Question: 203


url.regex=!.html$ d DENY

What is the effect of the above CPL code?

  1. Deny any URL that ends with html

  2. Deny any URL that does not end with html

  3. Deny any URL that ends with htm or html

  4. Deny any URL that does not end with htm or html


Answer: B


Question: 204


Which of the following statements are true about dynamic bypass list? (Choose all that apply)

  1. Configured polices will not be enforced on client request if the request matches an entry in the bypass list.

  2. Dynamic bypass entries are lost when ProxySG is restarted

  3. If request made to a site in a forwarding policy is in the bypass list, the site is inaccessible

  4. Dynamic bypass parameters can be configured on Management Console and CLI.

  1. a, b & c only

  2. b, c & d only

  3. a, c & d only


Answer: B


Question: 205


You can NOT use a self-signed certificate when intercepting SSL traffic.

  1. True

  2. False


Answer: B


Question: 206


What criterion is NOT used to determine location awareness of a ProxyClient

  1. IP address range

  2. Virtual NICs IP address range

  3. The IP address of the closest AND concentrator

  4. DNS server IP address


Answer: C


Question: 207


Which of the following are true when attempting to deny access to file types?

  1. MIME type objects are matched against the Content-type request header; File Extension objects are matched against the GET response header; Apparent Data Type objects are matched against request data.

  2. MIME type objects are matched against the Content-type response header; File Extension objects are matched against the GET request header; Apparent Data Type objects are matched against response data.

  3. MIME type objects are matched against the Content-encoding response header; FileExtension objects are matched against the GET request header; Apparent Data Type objects are matched against response data.

  4. MIME type objects are matched against the Content-type response header; File Extension objects are matched against the GET request header; Apparent Data Type objects are matched against request data.


Answer: C


Question: 208


Which of the following steps have to be performed to support Kerberos Authentication? (Choose all that apply)

  1. A virtual URL that resolves to the IP of the ProxySG.

  2. Registering the BCAAA as a Service Principal Name.

  3. Configuring IWA Realm.

  4. Configuring Explicit Proxy.

  1. None of the above

  2. a, b & c only

  3. b, c & d only


Answer: D


Question: 209


Which of the following statements are true? (Choose all that apply)

  1. The SGOS object store utilizes a directory structure so that objects in cache can be accessed rapidly

  2. Information about a single object in cache be retrieved from the Management console or the CLI

  3. There are two object caches, the object cache which resides on disk and the object cache which resides in RAM

  4. The SGOS object store is separated by protocol (HTTP cache, FTP cache, etc.)

  1. a, b & c only

  2. a, c & d only

  3. b, c & d only

  4. All of the above


Answer: A


Question: 210


The ProxySG acts as both an ICAP client and ICAP server.

  1. True

  2. False


Answer: A


Question: 211


Which of the following statements are true about Reverse Proxy deployment?(Choose all that apply)

  1. Forwarding hosts in the forwarding file must be defined as "server" style

  2. Default-scheme in forwarding file is supported

  3. Protocol conversion between HTTPS <- ->HTTP are automatic

  4. ProxySG should be set with default DENY policy

  1. a, b & c only

  2. a, c & d only

  3. b, c & d only

  4. All of the above


Answer: B


image

6$03/( 48(67,216


7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV


.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP


$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP


([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP


3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV


*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV


8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV


7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\


'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU

.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG