Which TWO of the following can be performed by using a proxy.pac file? (Choose 2)
A - provide for failover protection
B - check web pages for worms or viruses
C - distribute requests to different NetCache proxy servers
D - shut down the computer if the user doesn’t authenticate promptly
Answer: A, C
Given the following service farm configuration, which request will be directed to the ICAP
application?
config.icapv1 .farm3.attr http://aroopam.comREQMOD_PRECACHE on rr on weak
A - Requests about to be initiated by NetCache to the server
B - Requests from the client before NetCache has initiated a request to the server
C - Requests from the client after NetCache has initiated a request to the server
D - Responses to requests initiated by NetCache after being cached on disk
E - Responses to requests initiated by NetCache before being cached on disk
Answer: B
Where is authentication server information logged?
A - Web Access log
B - Messages log
C - FTP log
D - client browser
E - SMB Instant Messaging
Answer: B
What is the advantage of using multiple authentication servers with a NetCache appliance?
A - NetCache will deny requests if authentication isn’t provided within 200ms.
B - They ensure authenticated access if authentication server fails.
C - They ensure authenticated access across multiple domains.
D - Authentication uses encryption and is CPU-intensive.
Answer: B
Which FOUR are licensed protocols? (Choose 4)
A - DNS caching
B - ICAP
C - HTTPS Proxy
D - HTTP Proxy
E - GRM Server
Answer: B, C, D, E
Which FOUR are key steps in the authentication process? (Choose 4)
A - verify protocol authentication settings (authenticates the user)
B - verity ACL permission settings for the applicable group in the NetCache user database
C - verify whether SmartFilter or WebWasher DynaBLocator denies the request
D - verify connectivity to logging server
E - allow or deny the request, based on the results of the authentication process
Answer: A, B, C, E
Which FOUR will best prevent client disruption caused by hardware failure when using multiple
proxies? (Choose 4)
A - load balancer
B - round-robin DNS
C - direct browser configuration
D - transparency utilizing WCCP
E - autoconfiguration using a proxy.pac file
Answer: A, B, D, E
Which TWO of the following server types can function as a logging target for NetCache? (Choose
2)
A - FTP
B - CIFS
C - HTTP
D - NFS
Answer: A, C
Which FOUR steps are necessary to test that authentication is working properly with NTLM?
(Choose 4)
A - configure NTLM authentication
B - add the appropriate ACLs to use authentication
C - visit a Web site through the NetCache proxy
D - inspect the Web Access log files for authentication activity
E - enable packet tracing with pktt and analwe the results
Answer: A, B, C, D
________ consistency should be used for service farms that run more than one version of a
service, and differences in results are expected to be minor and not noticeable.
A - Strong
B - Weak
C - IBW
D - Mixed
Answer: B
Which TWO are most probable side-effects of authentication in a transparent deployment?
(Choose 2)
A - In a Network Address Translation environment, users may obtain shared privileges, never be
challenged, or both.
B - Its conformance with HTTP 1.1 specification is lost.
C - It reduces the number of authentication prompts to the end user.
D - It simplifies setup of the NetCache and authentication server.
Answer: A, B
Given the following service farm configuration, which requests will be scanned by the ICAP
server? config.icapv1 .farm0.attr = marketing_resp RESPMOD_PRECACHE on rr on weak
A - responses before being sent to NetCache
B - responses from NetCache
C - responses before being sent to the ICAP server
D - responses from the Internet
Answer: C
Which ACL action is used to send a REQMOD_PRECACHE request to an ICAP service without
processing additional ACLs?
A - icap
B - icap_now
C - attribute
D - ad idap
Answer: B
In what TWO places do you enter License keys? (Choose2)
A - command line with the license command
B - the Appliance Manager
C - SNMP agents.
D - the admin host or domain controller
Answer: A, B
Which vector point is used to route an object to the ICAP server from NetCache, but before the
data is requested from the Web server?
A - REQMOD_PRECACHE
B - REQMOD_PDSTCACHE
C - RESPMOD_PRECACHE
D - RESPMOD_POSTCACHE
Answer: B
Which THREE are advantages of using NetCache as an accelerator? (Choose 3)
A - It can offload traffic from a Web server.
B - It shields a Web server from the Internet.
C - It reduces firewall workload.
D - It places content closer to the user.
Answer: A, B, C
Which authentication methods, used to receive client credentials, are performed once per
connection instead of performed once per request?
A - NTLM and Kerberos
B - LDAP and Basic
C - FTP and NTP
D - RADIUS and challenge-response
Answer: A
Which THREE are access methods for the NetCache appliance? (Choose 3)
A - transparent (indirect) access
B - non-transparent (direct) access
C - request routing for content distribution networks
D - protocol routing for content distribution networks
Answer: A, B, C
When NetCache is implemented as a reverse proxy (accelerator), which FOUR of the following
protocols can be accelerated? (Choose 4)
A - HTTP
B - NTP
C - MMS
D - RTSP
E - HTTPS
Answer: A, C, D, E
Which THREE of these Internet protocols are supported for ICAP virus scanning? (Choose 3)
A - HTTP
B - FTP
C - HTTPS
D - HTTP over FTP
Answer: A, B, D
Which THREE are necessary for capacity planning? (Choose 3)
A - number of users
B - operating systems of users
C - type of work or activity
D - expected load at peak intervals
Answer: A, C, D
What is the difference between the following two ACLs?
Deny url matches “.”.org”
Deny server-domain contains “org’
A - The first ACL reads the entire URL, the second ACL reads only the server-domain field in the
URL.
B - The first ACL is more efficient because it uses regular expressions and will match more UPLs.
C - The first ACL is a syntax that is specific to the HTTP protocol only, while the second URL is a
general purpose ACL.
D - The first ACL uses incorrect syntax and will cause an error message. The second ACL is
correct.
Answer: A
Given the following ACL, if Bob is in group 1, when is he allowed? > allow group grp1 and time
9:00am - 5:00pm> deny group grp2 > deny any
A - Bob has access between 9:00 AM through 5:00 PM.
B - Bob has access after 5:00 PM and until 9:00 AM.
C - Bob has access regardless of the time because he is in group 1.
D - Bob has access either when he is a member of group 1 or between 9:00 AM and 5:00 PM.
Answer: A
Which TWO of the following can be performed by using a proxy.pac file? (Choose 2)A - provide for failover protectionB - check web pages for worms or virusesC - distribute requests to different NetCache proxy serversD - shut down the computer if the user doesn’t authenticate promptlyAnswer: A, CGiven the following service farm configuration, which request will be directed to the ICAPapplication?config.icapv1 .farm3.attr http://aroopam.comREQMOD_PRECACHE on rr on weakA - Requests about to be initiated by NetCache to the serverB - Requests from the client before NetCache has initiated a request to the serverC - Requests from the client after NetCache has initiated a request to the serverD - Responses to requests initiated by NetCache after being cached on diskE - Responses to requests initiated by NetCache before being cached on diskAnswer: BWhere is authentication server information logged?A - Web Access logB - Messages logC - FTP logD - client browserE - SMB Instant MessagingAnswer: BWhat is the advantage of using multiple authentication servers with a NetCache appliance?A - NetCache will deny requests if authentication isn’t provided within 200ms.B - They ensure authenticated access if authentication server fails.C - They ensure authenticated access across multiple domains.D - Authentication uses encryption and is CPU-intensive.Answer: BWhich FOUR are licensed protocols? (Choose 4)A - DNS cachingB - ICAPC - HTTPS ProxyD - HTTP ProxyE - GRM ServerAnswer: B, C, D, EWhich FOUR are key steps in the authentication process? (Choose 4)A - verify protocol authentication settings (authenticates the user)B - verity ACL permission settings for the applicable group in the NetCache user databaseC - verify whether SmartFilter or WebWasher DynaBLocator denies the requestD - verify connectivity to logging serverE - allow or deny the request, based on the results of the authentication processAnswer: A, B, C, EWhich FOUR will best prevent client disruption caused by hardware failure when using multipleproxies? (Choose 4)A - load balancerB - round-robin DNSC - direct browser configurationD - transparency utilizing WCCPE - autoconfiguration using a proxy.pac fileAnswer: A, B, D, EWhich TWO of the following server types can function as a logging target for NetCache? (Choose2)A - FTPB - CIFSC - HTTPD - NFSAnswer: A, CWhich FOUR steps are necessary to test that authentication is working properly with NTLM?(Choose 4)A - configure NTLM authenticationB - add the appropriate ACLs to use authenticationC - visit a Web site through the NetCache proxyD - inspect the Web Access log files for authentication activityE - enable packet tracing with pktt and analwe the resultsAnswer: A, B, C, D________ consistency should be used for service farms that run more than one version of aservice, and differences in results are expected to be minor and not noticeable.A - StrongB - WeakC - IBWD - MixedAnswer: BWhich TWO are most probable side-effects of authentication in a transparent deployment?(Choose 2)A - In a Network Address Translation environment, users may obtain shared privileges, never bechallenged, or both.B - Its conformance with HTTP 1.1 specification is lost.C - It reduces the number of authentication prompts to the end user.D - It simplifies setup of the NetCache and authentication server.Answer: A, BGiven the following service farm configuration, which requests will be scanned by the ICAPserver? config.icapv1 .farm0.attr = marketing_resp RESPMOD_PRECACHE on rr on weakA - responses before being sent to NetCacheB - responses from NetCacheC - responses before being sent to the ICAP serverD - responses from the InternetAnswer: CWhich ACL action is used to send a REQMOD_PRECACHE request to an ICAP service withoutprocessing additional ACLs?A - icapB - icap_nowC - attributeD - ad idapAnswer: BIn what TWO places do you enter License keys? (Choose2)A - command line with the license commandB - the Appliance ManagerC - SNMP agents.D - the admin host or domain controllerAnswer: A, BWhich vector point is used to route an object to the ICAP server from NetCache, but before thedata is requested from the Web server?A - REQMOD_PRECACHEB - REQMOD_PDSTCACHEC - RESPMOD_PRECACHED - RESPMOD_POSTCACHEAnswer: BWhich THREE are advantages of using NetCache as an accelerator? (Choose 3)A - It can offload traffic from a Web server.B - It shields a Web server from the Internet.C - It reduces firewall workload.D - It places content closer to the user.Answer: A, B, CWhich authentication methods, used to receive client credentials, are performed once perconnection instead of performed once per request?A - NTLM and KerberosB - LDAP and BasicC - FTP and NTPD - RADIUS and challenge-responseAnswer: AWhich THREE are access methods for the NetCache appliance? (Choose 3)A - transparent (indirect) accessB - non-transparent (direct) accessC - request routing for content distribution networksD - protocol routing for content distribution networksAnswer: A, B, CWhen NetCache is implemented as a reverse proxy (accelerator), which FOUR of the followingprotocols can be accelerated? (Choose 4)A - HTTPB - NTPC - MMSD - RTSPE - HTTPSAnswer: A, C, D, EWhich THREE of these Internet protocols are supported for ICAP virus scanning? (Choose 3)A - HTTPB - FTPC - HTTPSD - HTTP over FTPAnswer: A, B, DWhich THREE are necessary for capacity planning? (Choose 3)A - number of usersB - operating systems of usersC - type of work or activityD - expected load at peak intervalsAnswer: A, C, DWhat is the difference between the following two ACLs?Deny url matches “.”.org”Deny server-domain contains “org’A - The first ACL reads the entire URL, the second ACL reads only the server-domain field in theURL.B - The first ACL is more efficient because it uses regular expressions and will match more UPLs.C - The first ACL is a syntax that is specific to the HTTP protocol only, while the second URL is ageneral purpose ACL.D - The first ACL uses incorrect syntax and will cause an error message. The second ACL iscorrect.Answer: AGiven the following ACL, if Bob is in group 1, when is he allowed? > allow group grp1 and time9:00am - 5:00pm> deny group grp2 > deny anyA - Bob has access between 9:00 AM through 5:00 PM.B - Bob has access after 5:00 PM and until 9:00 AM.C - Bob has access regardless of the time because he is in group 1.D - Bob has access either when he is a member of group 1 or between 9:00 AM and 5:00 PM.Answer: A
No comments:
Post a Comment
Leave Your Valuable Opinion