单项选择题Which of these is not used as a monitoring tool?()

A. CLI commands
B. email alerts
C. SNMP traps
D. policy trace


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题What is a benefit of NTLMSSP over basic authentication?() 

A. basic cannot be used in transparent proxy mode
B. basic requiresreauthentication with every new domain
C. NTLMSSP is compatible with open LDAP
D. NTLMSSP is more secure than basic

2.单项选择题TRR and TRT are associated with Which WSA component?() 

A. Web Reputation
B. L4TM
C. Anti-Malware
D. URL Filters

3.单项选择题Which CLI command is used to create a W3C log?() 

A. make log
B. log config
C. w3c log config
D. advance dproxy config
E. mklog file

4.单项选择题Why does L4TM require T1 to be in promiscuous mode?() 

A.to process traffic that is not intended for its MAC address
B.to transmit TCP reset packets
C.to bind with other promiscuous mode ports
D.to receive Ethernet broadcasts

7.单项选择题What are PAC files used for?() 

A. explicit forward mode proxy deployments
B. L4TM
C. transparent mode proxy deployments
D. user agent-based policies

8.单项选择题In the access log,what does an ACL tag beginning with BLOCK_ADMIN indicate?() 

A. the destination was manually added to the block list
B. the malware category is set to blocking mode
C. the transaction was blocked because of application or object properties
D. the transaction was manually blocked by the administrative user

9.单项选择题Which of these can not be used in defining policies?()

A.time of day
B.user agent
C.proxy port
D.usage quotas

10.单项选择题What does the appearance of the ACL tag BLOCK_WBRS in the access log mean?() 

A. the proxy blocked an outbound request because the client is infected with malware
B. the proxy blocked access to a site with a low reputation score
C. the proxy blocked access to a site because of a suspicious server response
D. your appliance or the WBRS key is out of support