1.Per-user bandwidth limits are configured as part of what type of policy.?
Select exactly 1 answer(s) from the following:
A. user quota policies
B. access policies
C. AVC policies
D. identity policies
Answer: A
2.Which of the following commands is used to tune the WSA proxy caching behavior?
Select exactly 1 answer(s) from the following:
A. webcache
B. proxyconfig
C. advancedproxyconfi
D. proxy stat
Answer: C
3.If authentication is enabled, which of the following is true?
Select exactly 1 answer(s) from the following:
A. Client reports are not affected by authentication.
B. Client reports will display both the user name and IP address of the clients.
C. Client reports will display authenticated user names.
D. Client reports will display the IP address of the authentication server.
Answer: C
4.Which statement is true about WSA user authentication?
Select exactly 1 answer(s) from the following:
A. A single WSA can have up to two authentication realms: one for LDAP and one for NTML.
B. WSA supports NTLM, but not LDAP.
C. A single WSA can have multiple LDAP realms.
D. WSA supports LDAP, but not NTLM.
Answer: C
5.What is a benefit of NTLMSSP over Basic authentication?
Select exactly 1 answer(s) from the following:
A. NTLMSSP is more secure than Basic.
B. Basic requires re-authentication with every new domain,
C. NTLMSSP is compatible with OpenLDAP.
D. Basic cannot be used in transparent proxy mode.
Answer: A
6.Which of the following commands is used to view the cache hit rate?
Select exactly 1 answer(s) from the following:
A. advancedproxyconfig
B. proxyconfig
C. webcache
D. proxy stat
Answer: D
7.In the System Setup Wizard, the default action for the WSA when malware is detected can be configured. Assume you do not change this setting when running the System Setup Wizard, What will this default action be set to? Select exactly 1 answer(s) from the following:
A. drop
B. monitor
C. block
D. allow
E. pass through
Answer: B