What are two (2) access methods to the ProxySG? (Choose two.)
How does the ProxySG handle a rule that contains a syntax error when the ProxySG processes installed policy as part of a client transaction? (Choose the best answer.)
Which two (2) methods are able to be used to regain access to the setup console if an administrator loses the password? (Choose two.)
Which SGOS edition is designed for Secure Web Gateway hardware deployments? (Choose the best answer.)
Which process should never be configured on external DNS servers? (Choose the best answer.)
What happens when the ProxySG discovers a match for a rule in policy? (Choose the best answer.)
What is a drawback to utilizing apparent data types to detect the file type? (Choose the best answer.)
What is a series of sysinfo files gathered at periodic intervals called? (Choose the best answer.)
What does it mean if WebPulse returns a URL category of “Pending”? (Choose the best answer.)
What is typically the biggest load on a CPU when managing encrypted traffic? (Choose the best answer.)