Which of the following authentication mode will allow you to visibly challenge the user upon inactivity timeout? (Choose all that apply)(a) Form based authentication(b) Cookie Surrogate(c) IP surrogate(d) Session based surrogate a & b only
Which of the following are the benefits of using Bandwidth Management with the ProxySG? (Choose all that apply)(a) Ensuring mission critical application receives minimum amount of bandwidth(b) Compressing certain type of traffic classes before transmitting it over the WAN(c) Prioritizing certain traffic classes(d) Rate limiting application to prevent "hogging" of network bandwidth.
The Access Control List (ACL) option in the management console (configured by the menu item Configuration >Authentication >Console access) will be enforced for which types of administrative accounts? (Choose all that apply)(a) LDAP realm account(b) Local realm account(c) Built-in account(d) IWA realm account
At which checkpoint does the rewrite_url_prefix perform the TWURL modification?
Which of the following options are configured when implementing failover on ProxySG appliances? (Choose all that apply)(a) Multicast address for advertisements(b) Relative Priority(c) Virtual MAC address(d) Group Secret to hash information sent in multicast announcements
Which of the following are true when attempting to deny access to file types?