Blue Coat Certified Proxy Professional BCCPP Set 1

Which of the following are obvious advantages of having a ProxySG deployed in a Reverse Proxy environment? (Choose all that apply)
(a)The ProxySG has built in DOS protection to guard the actual web server from denial-of-service attacks
(b) Increased performance with caching provides an improved Web Experience
(c) Consistent default behavior of cache expiration and validation directives
(d) SSL termination on ProxySG allow SSL offloading, therefore eliminating bottleneck on the web server side.


Options are :

  • All of the above
  • a, b & c only
  • a, b & d only
  • b, c & d only

Answer : a, b & d only

Blue Coat Certified Proxy Professional BCCPP Set 2

Which of these are the features of a Blue Coat Director? (Choose all that apply)
(a) Install and update configurations of a group of ProxySG
(b) Distribute and control content of a group of ProxySG
(c) Managing SSL VPN configuration
(d) Monitoring ProxySG Performance


Options are :

  • a, b & c only
  • a, b & d only
  • b, c & d only
  • a, c & d only

Answer : a, b & d only

Which client deployment methods support the 407 Proxy Authentication Required response code? (Choose all that apply)
(a) Proxy Auto Configuration files
(b) WCCP
(c) Proxy settings in browser
(d) Inline Bridging


Options are :

  • a & b only
  • b & c only
  • c & d only
  • a & c only
  • All of the above

Answer : a & c only

After creating CPL in the local policy file, the policy is imported into the VPM CPL file so that it can be viewed through the Visual Policy Manager.


Options are :

  • True
  • False

Answer : True

Blue Coat Certified Proxy Professional BCCPP Set 4

With ProxySG failover, the failover Virtual IP address can be the same as the IP address assigned to the master.


Options are :

  • True
  • False

Answer : False

ProxySG is configured to permit error but guest authentication is not configured. What will happen to a user who initiates a connection to the Internet?


Options are :

  • The user will receive an error notifying unsuccessful authentication.
  • The user will be allowed to proceed as a guest user.
  • The user will be allowed to proceed as unauthenticated.
  • The user will receive an error notifying Access Denied.

Answer : The user will receive an error notifying unsuccessful authentication.

What is the protocol used for Blue Coat Director to communicate with ProxySG?


Options are :

  • SSL
  • Telnet
  • SSH v2
  • HTTPS

Answer : SSH v2

Blue Coat Certified Proxy Professional BCCPP Set 3

What are the two functions of configuring forwarding in ProxySG? (Choose all that apply)


Options are :

  • To accelerate application
  • Reverse Proxy
  • To support Proxy Chaining
  • To intercept SSl

Answer : To support Proxy Chaining To intercept SSl

When a ProxyClient setup file is manually on a client's computer, what data transfer takes place before ProxyClient is installed?


Options are :

  • ProxyClient setup program is self-contained; there is no data transfer necessary in order to complete the installation of the ProxyCinent
  • ProxyCilent setup program cause download of the most recent updates from a public download site https://hypersonic.bluecoat.com/.
  • ProxyClient setup program transfers data form Client Manager ProxySG appliance before it can install successfully.
  • ProxyClient setup program transfers data form the AND manager (or backup AND manager) ProxySG appliance before it can install successfully.

Answer : ProxyClient setup program transfers data form Client Manager ProxySG appliance before it can install successfully.

When a backup ProxySG takes over because the master fails, which of the following will occur?


Options are :

  • Policy from the master is replicated on the backup.
  • A failover event is logged in the event log.
  • An email notification is sent to the ProxySG administrator.
  • The backup begins replying to ARPS for the Virtual MAC address.

Answer : A failover event is logged in the event log.

Blue Coat Certified Proxy Professional BCCPP Set 4

Health checks are automatically created under which scenarios? (Choose all that apply)
(a) When a forwarding host is created.
(b) When a failover group is created.
(c) When the DRTR is enabled.
(d) When a SOCKS gateway is created.


Options are :

  • a, b & c only
  • a, c & d only
  • b, c & d only
  • All of the above

Answer : a, c & d only

At which checkpoint does the rewrite () perform the TWURL modification?


Options are :

  • Client In
  • Client Out
  • Server In
  • Server Out

Answer : Client Out

When creating a TCP tunnel service in explicit mode, you must also configure a forwarding host?


Options are :

  • True
  • False

Answer : True

Blue Coat Certified Proxy Professional BCCPP Set 4

In regards to authentication the ProxySG does not support origin-redirects with CONNECT method.


Options are :

  • True
  • False

Answer : True

What are the available actions for any given category, when defining ProxyClient content filtering configuration? (Choose all that apply)
(a) Allow
(b) Deny
(c) Temporarily Allow
(d) Warm


Options are :

  • a & b only
  • a, b & c only
  • a, b & d only
  • All of the above

Answer : a & b only

Which statement is correct about WWW-Authenticate header?


Options are :

  • It is request header used only with Basic Authentication to send username and password to a proxy or a Web server
  • It is a request header used to send credentials
  • It is a response header used with HTTP 401 status code to negotiate method of authentication and send NTLM challenge to the client.

Answer : It is a request header used to send credentials

The authentication mode origin-ip-redirect allows an administrator to assign a Time To Live (TTL) for the surrogate credentials. Meanwhile the authentication mode origin-cookie-redirect does not provide this feature.


Options are :

  • True
  • False

Answer : False

What is the meaning of the metacharacter \ (backslash) in regular expressions?


Options are :

  • escape character
  • any character except newline
  • zero or character
  • zero or more character

Answer : escape character

When configuring forwarding in PoxySG, what are the possible load balancing methods?
(Choose all that apply)
(a) Round Robin
(b) Fastest ICMP Reply
(c) Least Connections
(d) Least Delay


Options are :

  • a & c only
  • b & d only
  • a & d only
  • b & c only

Answer : a & c only

ICAP responses may be cached on a ProxySG, i.e, for some Web requests ICAP processing may be completed without involving ProxyAV


Options are :

  • True
  • False

Answer : True

Which of the following are true when enabling the early intercept attribute for a proxy service? (Choose all that apply)
(a) It is automatically enabled when the detect protocol attribute is enabled.
(b) The ProxySG completes the three-way TCP handshake with the client before establishing a connection to the upstream server.
(c) It can be used with any protocol.


Options are :

  • a & c only
  • a & b only
  • c only
  • All of the above

Answer : a & c only

When implementing failover with ProxySG appliances, configurations and policies on the master are automatically replicated to members of the failover group.


Options are :

  • True
  • False

Answer : True

What are the advantages that you may get in deploying ProxySG with WCCP? (Choose all the apply)
(a) Scalability
(b) Redundancy
(c) Load Balancing
(d) Security


Options are :

  • All of the above
  • a, b & c only
  • b, c & d only
  • a, b & d only

Answer : All of the above

ProxySG can cache videos played by Adobe Flash based video player (e.g. on YouTube) as HTTP objects.


Options are :

  • True
  • False

Answer : True

Steaming traffic is better managed by using ProxySG's admission control features.


Options are :

  • True
  • False

Answer : False

What is the meaning of the metacharacter * (asterisk) in regular expressions?


Options are :

  • escape character
  • any character except newline
  • zero or character
  • zero or more characters

Answer : zero or more characters

Which of the following are some of the general requirements for using Kerberos Authentication? (Choose all that apply)
(a) SGOS 4.2x or higher
(b) Internet Explorer 5
(c) Transparent Proxy Deployment
(d) Windows 2000 and above


Options are :

  • a, b & c only
  • b, c & d only
  • a, c & d only
  • All of the above

Answer : a, c & d only

Which of the following authentication mode will allow you to visibly challenge the user upon inactivity timeout? (Choose all that apply)
(a) Form based authentication
(b) Cookie Surrogate
(c) IP surrogate
(d) Session based surrogate a & b only


Options are :

  • a & b only
  • b & c only
  • c & d only
  • d & a only
  • All of the above

Answer : b & c only

Which of the following are the benefits of using Bandwidth Management with the ProxySG? (Choose all that apply)
(a) Ensuring mission critical application receives minimum amount of bandwidth
(b) Compressing certain type of traffic classes before transmitting it over the WAN
(c) Prioritizing certain traffic classes
(d) Rate limiting application to prevent "hogging" of network bandwidth.


Options are :

  • a, b & c only
  • a, b & d only
  • a, c & d only
  • All of the above

Answer : a, c & d only

The Access Control List (ACL) option in the management console (configured by the menu item Configuration >Authentication >Console access) will be enforced for which types of administrative accounts? (Choose all that apply)
(a) LDAP realm account
(b) Local realm account
(c) Built-in account
(d) IWA realm account


Options are :

  • All of the above
  • a & b only
  • c only
  • c & d only
  • None of the above

Answer : All of the above

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions