Which THREE of these Internet protocols are supported for ICAP virus scanning? (Choose 3)
A - HTTP
B - FTP
C - HTTPS
D - HTTPoverFTP
Answer: A, B, D
Which THREE are necessary for capacity planning? (Choose 3)
A - number of users
B - operating systems of users
C - type of work or activity
D - expected load at peak intervals
Answer: A, C, D
In what TWO places do you enter License keys? (Choose2)
A - command line with the license command
B - the Appliance Manager
C - SNMP agents.
D - the admin host or domain controller
Answer: A, B
Which THREE are access methods for the NetCache appliance? (Choose 3)
A - transparent (indirect) access
B - non-transparent (direct) access
C - request routing for content distribution networks
D - protocol routing for content distribution networks
Answer: A, B, C
Which FOUR will best prevent client disruption caused by hardware failure when using multiple
proxies? (Choose 4)
A - load balancer
B - round-robin DNS
C - direct browser configuration
D - transparency utilizing WCCP
F - auto configuration using a proxy.pac file
Answer: A, B, D, E
Where is authentication server information logged?
A - Web Access log
B - Messages log
C - FTP log
D - client browser
E - SMB Instant Messaging
Answer: B
Given the following service farm configuration, which request will be directed to the ICAP
application? config.icapv1 .farm3.attr http://trainerslisting.comREOMOD_PRECACHE on rr
on weak
A - Requests about to be initiated by NetCache to the server
B - Requests from the client before NetCache has initiated a request to the server
C - Requests from the client after NetCache has initiated a request to the server
D - Responses to requests initiated by NetCache after being cached on disk
E - Responses to requests initiated by NetCache before being cached on disk
Answer: B
Which TWO of the following can be performed by using a proxy.pac file? (Choose 2)
A - provide for failover protection
B - check web pages for worms or viruses
C - distribute requests to different NetCache pros servers
D - shut down the computer if the user doesn’t authenticate promptly
Answer: A, C
A router performs which one of the following functions for NetCache proxies?
A - It fragments large packets into smaller chunks that the NetCache appliance can handle.
B - It tags Etherchannel packets for pre-processing.
C - It delivers inbound packets from other networks and sends outbound packets destined for
other networks.
D - It strips virus packets out before they can infect the NetCache appliance.
Answer: C
Which FOUR cache control headers below are valid? (Choose 4)
A - Cache-Control: no-cache
B - Pragma: do-not-cache
C - Cache-Control: no-store
D - Cache-Control: private
E - Pragma: no-cache
Answer: A, C, D, E
When NetCache is implemented as a reverse proxy (accelerator), which FOUR of the following
protocols can be accelerated? (Choose 4)
A - HTTP
B - NTP
C - MMS
D - RTSP
E - HTTPS
Answer: A, C, D, E
Which THREE of these Internet protocols are supported for ICAP virus scanning? (Choose 3)A - HTTPB - FTPC - HTTPSD - HTTPoverFTPAnswer: A, B, DWhich THREE are necessary for capacity planning? (Choose 3)A - number of usersB - operating systems of usersC - type of work or activityD - expected load at peak intervalsAnswer: A, C, DIn what TWO places do you enter License keys? (Choose2)A - command line with the license commandB - the Appliance ManagerC - SNMP agents.D - the admin host or domain controllerAnswer: A, BWhich THREE are access methods for the NetCache appliance? (Choose 3)A - transparent (indirect) accessB - non-transparent (direct) accessC - request routing for content distribution networksD - protocol routing for content distribution networksAnswer: A, B, CWhich FOUR will best prevent client disruption caused by hardware failure when using multipleproxies? (Choose 4)A - load balancerB - round-robin DNSC - direct browser configurationD - transparency utilizing WCCPF - auto configuration using a proxy.pac fileAnswer: A, B, D, EWhere is authentication server information logged?A - Web Access logB - Messages logC - FTP logD - client browserE - SMB Instant MessagingAnswer: BGiven the following service farm configuration, which request will be directed to the ICAPapplication? config.icapv1 .farm3.attr http://trainerslisting.comREOMOD_PRECACHE on rron weakA - Requests about to be initiated by NetCache to the serverB - Requests from the client before NetCache has initiated a request to the serverC - Requests from the client after NetCache has initiated a request to the serverD - Responses to requests initiated by NetCache after being cached on diskE - Responses to requests initiated by NetCache before being cached on diskAnswer: BWhich TWO of the following can be performed by using a proxy.pac file? (Choose 2)A - provide for failover protectionB - check web pages for worms or virusesC - distribute requests to different NetCache pros serversD - shut down the computer if the user doesn’t authenticate promptlyAnswer: A, CA router performs which one of the following functions for NetCache proxies?A - It fragments large packets into smaller chunks that the NetCache appliance can handle.B - It tags Etherchannel packets for pre-processing.C - It delivers inbound packets from other networks and sends outbound packets destined forother networks.D - It strips virus packets out before they can infect the NetCache appliance.Answer: CWhich FOUR cache control headers below are valid? (Choose 4)A - Cache-Control: no-cacheB - Pragma: do-not-cacheC - Cache-Control: no-storeD - Cache-Control: privateE - Pragma: no-cacheAnswer: A, C, D, EWhen NetCache is implemented as a reverse proxy (accelerator), which FOUR of the followingprotocols can be accelerated? (Choose 4)A - HTTPB - NTPC - MMSD - RTSPE - HTTPSAnswer: A, C, D, E
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Leave Your Valuable Opinion