Which of the following steps are not required when configuring a transparently deployed ProxySG to intercept HTTPS traffic?
Apparent Data Type objects can be created in the VPM for which of the following file types?(Choose all that apply)(a) Windows DLL(b) Windows Exe(c) Windows Ocx(d) Windows Cab
What type of authentication challenge is issued when using the Policy Substitution Realm?
A service can be configured to listen in explicit and transparent mode simultaneously.
When configuring reverse proxy with SSL, what are the 3 possible options of ensuring host affinity? (Choose all that apply)(a) client-ip(b) ssl-session-id(c) accelerator-cookie(d) server-ip
Which of the following are true when attempting to deny access to file types?