In NTLM authentication, passwords are normally transmitted in which of these ways?
Correct Answer:
C
Reference:http://msdn.microsoft.com/en-us/library/windows/desktop/aa378749(v=vs.85).aspx
What acceleration techniques are NOT part of MACHS?
Correct Answer:
C
Reference:http://www.edgeblue.com/Mach5.asp
When the ProxySG 200's power LED indicator alternates between green and amber, it means that the system is booting.
Correct Answer:
B
Reference:http://download.cacheflow.com/manuals/SGOS4/SG200_Install_4x.pdf(page 10 and33)
Which of these proxy service components are responsible for detecting incoming traffic that matches specific IP addresses or subnets?
Correct Answer:
A
Which of the following statements are true about WCCP? (Choose all that apply)
(a) WCCP version 1 only redirects traffic based on TCP destination port 80 while WCCP version 2 can redirect more than just port 80.
(b) WCCP version 1 supports only single proxy while WCCP version 2 can support up to 32 proxies in a single service group.
(c) WCCP version 1 is the default version supported by ProxySG unless configured otherwise.
(d) WCCP version 2 is more suitable for multiple router deployment as it allows multicast discovery.
Correct Answer:
C