Test Information:
Total Questions: 211
Test Number: BCCPP
Vendor Name: Blue Coat
Cert Name: Blue Coat Systems
Test Name: Blue Coat Certified Proxy Professional
Official Site: http://www.certsgrade.com
For
More Details: http://www.certsgrade.com/pdf/bccpp/
Version 9.1
Question: 1
Which of the following are true when attempting to deny
access to file types?
A. MIME type objects are matched against the Content-type
request header; File Extension objects are matched against the GET response
header; Apparent Data Type objects are matched against request data.
B. MIME type objects are matched against the Content-type
response header; File Extension objects are matched against the GET request
header; Apparent Data Type objects are matched against response data.
C. MIME type objects are matched against the
Content-encoding response header; File
Extension objects are matched against the GET request
header; Apparent Data Type objects are matched against response data.
D. MIME type objects are matched against the Content-type
response header; File Extension objects are matched against the GET request
header; Apparent Data Type objects are matched against request data.
Answer:
C
Question: 2
Which of the following steps have to be performed to
support Kerberos Authentication?
(Choose all that apply)
(a) A virtual URL that resolves to the IP of the ProxySG.
(b) Registering the BCAAA as a Service Principal Name.
(c) Configuring IWA Realm.
(d) Configuring Explicit Proxy.
A. All of the above
B. None of the above
C. a, b & c only
D. b, c & d only
Answer:
D
Question: 3
Which of the following statements are true? (Choose all
that apply)
(a) The SGOS object store utilizes a directory structure
so that objects in cache can be accessed rapidly
(b) Information about a single object in cache be
retrieved from the Management console or the CLI
(c) There are two object caches, the object cache which
resides on disk and the object cache which resides in RAM
(d) The SGOS object store is separated by protocol (HTTP
cache, FTP cache, etc.)
A. a, b & c only
B. a, c & d only
C. b, c & d only
D. All of the above
Answer:
A
Question: 4
The ProxySG acts as both an ICAP client and ICAP server.
A. True
B. False
Answer:
A
Question: 5
Which of the following statements are true about Reverse
Proxy deployment?(Choose all that apply)
(a) Forwarding hosts in the forwarding file must be
defined as "server" style
(b) Default-scheme in forwarding file is supported
(c) Protocol conversion between HTTPS <- ->HTTP are
automatic
(d) ProxySG should be set with default DENY policy
A. a, b & c only
B. a, c & d only
C. b, c & d only
D. All of the above
Answer:
B
Question: 6
Which of the following statements are true about ProxySG
Protocol Detection feature?
(Choose all that apply)
(a) Protocol detection is performed on the server's
response.
(b) Protocol detection is performed on the client's
request.
(c) Enabling Detect Protocol option will automatically
enable early intercept attribute in proxy services.
(d) Protocol detection is performed by looking at the TCP
port number.
A. a & b only
B. b & c only
C. c & d only
D. ALL of the above
Answer:
D
Question: 7
url.regex=!\.html$ d\ DENY
What is the effect of the above CPL code?
A. Deny any URL that ends with html
B. Deny any URL that does not end with html
C. Deny any URL that ends with htm or html
D. Deny any URL that does not end with htm or html
Answer: B
Question: 8
Which of the following statements are true about dynamic
bypass list? (Choose all that apply)
(a) Configured polices will not be enforced on client
request if the request matches an entry in the bypass list.
(b) Dynamic bypass entries are lost when ProxySG is
restarted
(c) If request made to a site in a forwarding policy is in
the bypass list, the site is inaccessible
(d) Dynamic bypass parameters can be configured on
Management Console and CLI.
A. All of the above
B. a, b & c only
C. b, c & d only
D. a, c & d only
Answer:
B
Question: 9
You can NOT use a self-signed certificate when
intercepting SSL traffic.
A. True
B. False
Answer:
B
Question: 10
What criterion is NOT used to determine location
awareness of a ProxyClient
A. IP address range
B. Virtual NICs IP address range
C. The IP address of the closest AND concentrator
D. DNS server IP address
Answer:
C
Question: 11
Which method of controlling downloads of certain file
types works fastest on ProxySG?
A. Apparent Data Type
B. MIME Type
C. File extension
Answer:
C
Question: 12
A cookie without an expire value will___
A. last until the client cleats cookies from the browser
B. last until the client closes the browser session
C. last until the client logs off
Answer:
B
Question: 13
Which of the following hostnames are NOT matched by the
regular expression “www (0 9) (0-9)? \ .foo\ .com”)
A. www.foo.com
B. www01.foo.com
C. www1.foo.com
D. www11.foo.com
Answer:
A
Question: 14
The Content-encoding header is used to declare the MIME
type and compression method used in a HTTP response.
A. True
B. False
Answer:
A
Question: 15
Which of the following are obvious advantages of having a
ProxySG deployed in a Reverse Proxy environment? (Choose all that apply)
(a)The ProxySG has built in DOS protection to guard the
actual web server from denial-ofservice attacks
(b) Increased performance with caching provides an
improved Web Experience
(c) Consistent default behavior of cache expiration and
validation directives
(d) SSL termination on ProxySG allow SSL offloading,
therefore eliminating bottleneck on the web server side.
A. All of the above
B. a, b & c only
C. a, b & d only
D. b, c & d only
Answer:
C
Question: 16
Which of these are the features of a Blue Coat Director?
(Choose all that apply)
(a) Install and update configurations of a group of
ProxySG
(b) Distribute and control content of a group of ProxySG
(c) Managing SSL VPN configuration
(d) Monitoring ProxySG Performance
A. a, b & c only
B. a, b & d only
C. b, c & d only
D. a, c & d only
Answer:
B
Question: 17
Which client deployment methods support the 407 Proxy
Authentication Required response code? (Choose all that apply)
(a) Proxy Auto Configuration files
(b) WCCP
(c) Proxy settings in browser
(d) Inline Bridging
A. a & b only
B. b & c only
C. c & d only
D. a & c only
E. All of the above
Answer:
D
Question: 18
After creating CPL in the local policy file, the policy
is imported into the VPM CPL file so that it can be viewed through the Visual
Policy Manager.
A. True
B. False
Answer:
A
Question: 19
With ProxySG failover, the failover Virtual IP address
can be the same as the IP address assigned to the master.
A. True
B. False
Answer:
B
Question: 20
ProxySG is configured to permit error but guest
authentication is not configured. What will happen to a user who initiates a
connection to the Internet?
A. The user will receive an error notifying unsuccessful
authentication.
B. The user will be allowed to proceed as a guest user.
C. The user will be allowed to proceed as
unauthenticated.
D. The user will receive an error notifying Access
Denied.
Answer:
A
Test Information:
Total Questions: 211
Test Number: BCCPP
Vendor Name: Blue Coat
Cert Name: Blue Coat Systems
Test Name: Blue Coat Certified Proxy Professional
Official Site: http://www.certsgrade.com
For
More Details: http://www.certsgrade.com/pdf/bccpp/
No comments:
Post a Comment