Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

Hot Vendors
Note! The BCCPP Exam is no longer available.

BCCPP Blue Coat Certified Proxy Professional, V4.2 Questions and Answers

Questions 4

Which of the following access log formats are supported by the ProxySG? (Choose all that apply)

(a) ELFF

(b) SQUID

(c) Websense

(d) NCSA

Options:

A.

a, b & c only

B.

a, b & d only

C.

a, c & d only

D.

b, c & d only

E.

All of the above

Buy Now
Questions 5

Is it possible to run more than one version of a BCAAA acceptor on a Windows computer?

Options:

A.

Yes

B.

No

Buy Now
Questions 6

When a backup ProxySG takes over because the master fails, which of the following will occur?

Options:

A.

Policy from the master is replicated on the backup.

B.

A failover event is logged in the event log.

C.

An email notification is sent to the ProxySG administrator.

D.

The backup begins replying to ARPS for the Virtual MAC address.

Buy Now
Questions 7

If a CPL rule contains more than one trigger, how are the triggers evaluated?

Options:

A.

Only the last trigger is evaluated.

B.

They are logically ORed together; any one of them must be true for the rule to match.

C.

They are logically ANDed together; all of them must be true for the rule to match.

D.

Only the first trigger is evaluated.

E.

The answer depends on the type of layer.

Buy Now
Questions 8

If a mobile client is using ProxyClient and sends traffic through a ProxySG, which content filtering policy has priority?

Options:

A.

The policy on the ProxyClient.

B.

It depends on whether any policy has been installed on the ProxySG to disable ProxyClient content filtering on that transaction.

C.

The policy that is evaluated last.

D.

The policy on the ProxySG.

E.

The policy that is evaluated first.

Buy Now
Questions 9

What happens when a disk is removed from a ProxySG while it is running?

Options:

A.

Subsequent requests to objects that were cached on the removed disk will fail.

B.

The objects on the removed disk are automatically remapped to the remaining disks and are immediately refetched from the appropriate content servers.

C.

The objects on the removed disk are automatically remapped to the remaining disks and are refetched from the appropriate content servers the next time they are requested.

D.

All subsequent transactions to that ProxySG either fail open or fail closed, depending on configuration, until the disk is replaced.

Buy Now
Questions 10

In a network with three ProxySG appliances using IWA realms with BCAAA, what is the minimum number of BCAAAs that must be deployed, independent of performance considerations?

Options:

A.

One

B.

Three

C.

None of the above.

Buy Now
Questions 11

Which regular expression should you test against a URL to match both http and https schemes?

Options:

A.

2https?

B.

[http][https]

C.

^https?

D.

http[s]

Buy Now
Questions 12

Can the ProxySG initiate a transaction that does not correspond to a client action?

Options:

A.

Yes

B.

No

Buy Now
Questions 13

How must you configure the RTMP proxy service to process Flash traffic originating at youtube.com?

Options:

A.

Enable HTTP handoff on the Flash proxy on the ProxySG.

B.

Enable Detect Protocol on the External HTTP proxy service.

C.

Write policy in the VPM or CPL to direct traffic from youtube.com to the RTMP proxy service.

D.

You cannot do this.

Buy Now
Questions 14

The ProxySG compiles CPL code at installation time and performs optimizations that might not have been written into the code.

Options:

A.

True

B.

False

Buy Now
Questions 15

In CPL, using the define category construct with a list of 1,000 URLs usually produces more efficient code than explicitly specifying each individual URL as a separate test.

Options:

A.

True

B.

False

Buy Now
Questions 16

Perl statements can be included into CPL code as part of policy processing.

Options:

A.

True

B.

False

Buy Now
Questions 17

If cookie surrogates are used with a user agent that does not support cookies, how does the ProxySG respond?

Options:

A.

The ProxySG repeatedly tries to authenticate until the user agent gives up, and authentication is not successful.

B.

The ProxySG automatically switches to an IP surrogate and retries the authentication.

C.

The answer depends on whether any other user agents share the same IP address.

D.

This cannot happen; the ProxySG prevents such policy from being installed.

Buy Now
Questions 18

If a CPL rule is not part of a policy layer, when is it processed?

Options:

A.

Before any layers are processed.

B.

After all layers are processed.

C.

This cannot happen. All rules must be part of a layer.

Buy Now
Questions 19

By default, what method does the ProxySG use to balance traffic load among members of a forwarding group?

Options:

A.

Least connections

B.

Round robin

C.

None of the above

Buy Now
Questions 20

At which checkpoint does the rewrite () perform the TWURL modification?

Options:

A.

Client In

B.

Client Out

C.

Server In

D.

Server Out

Buy Now
Questions 21

When a URL-based trigger is used in CPL, the compiler analyzes the source to determine the most efficient trigger to achieve the desired result.

Options:

A.

True

B.

False

Buy Now
Questions 22

What are the two functions of configuring forwarding in ProxySG? (Choose all that apply)

Options:

A.

To accelerate application

B.

Reverse Proxy

C.

To support Proxy Chaining

D.

To intercept SSl

Buy Now
Questions 23

In CPL, what is the difference between Allow and OK?

Options:

A.

An Allow is final and cannot be reversed by subsequent policy processing.

B.

An OK is final and cannot be reversed by subsequent policy processing.

C.

Allow changes the current state of the transaction; OK makes no change.

D.

There is no difference.

Buy Now
Questions 24

Which client deployment methods support the 407 Proxy Authentication Required response code? (Choose all that apply)

(a) Proxy Auto Configuration files

(b) WCCP

(c) Proxy settings in browser

(d) Inline Bridging

Options:

A.

a & b only

B.

b & c only

C.

c & d only

D.

a & c only

E.

All of the above

Buy Now
Questions 25

What is the meaning of the metacharacter \ (backslash) in regular expressions?

Options:

A.

escape character

B.

any character except newline

C.

zero or character

D.

zero or more character

Buy Now
Questions 26

Policy that is written in CPL to control ProxySG forwarding should be placed in which policy file?

Options:

A.

Forward policy file.

B.

Threat protection policy file.

C.

Local policy file.

D.

Central policy file.

E.

The answer depends on the processing order configured in the Management Console.

Buy Now
Questions 27

Which of the following statements are true about Bandwidth Management Hierarchies and Priorities? (Choose all that apply)

(a) Child classes can have children of their own.

(b) If no limit is set, packets are sent as soon as they arrive.

(c) Priorities are set to a class to give precedence over other classes.

(d) If there is excess bandwidth, the child class will always get the first opportunity to use it.

Options:

A.

a, b & c only

B.

a, b & d only

C.

b, c & d only

D.

All of the above

Buy Now
Questions 28

In CPL, which of the following are possible results of a policy processing transaction? (Select all that apply)

Options:

A.

No match.

B.

One or more rules match, changing property value(s).

C.

One or more actions are invoked.

Buy Now
Questions 29

Objects that require more server-side bandwidth and response time are less likely to be deleted from the cache. This statement best describes which ProxySG caching technique?

Options:

A.

Popularity content

B.

Pipelining

C.

Cost-based deletion

D.

Asynchronous adaptive refresh

Buy Now
Questions 30

When permitting guest authentication, what is one way that can require users to specifically state that they wish to authenticate as a guest?

Options:

A.

By modifying the standard authentication_failed exception to include a link that users must click before continuing.

B.

By specifying a virtual URL that points to a guest authentication page.

C.

By using Force Authenticate in either the VPM or in CPL.

D.

By selecting Notify User in the Edit Authenticate Guest Object section of the VPM.

Buy Now
Questions 31

Which one of these statements best describes how the ProxySG locates an object in its cache?

Options:

A.

The ProxySG performs a hash against the URL of the object and uses the hash as the basis for a lookup into the table of cached objects.

B.

The ProxySG uses the hostname in the object’s URL to determine in which cache directory the object is located.

C.

The ProxySG uses the first 32 bytes of the object’s URL to determine in which cache directory the object is located.

Buy Now
Exam Code: BCCPP
Exam Name: Blue Coat Certified Proxy Professional, V4.2
Last Update: Mar 21, 2024
Questions: 211
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 21 Nov 2024