Which two (2) methods are able to be used to regain access to the setup console if an administrator loses the password? (Choose two.)
Which two (2) errors are the most common certificate errors? (Choose two.)
In which type of physical deployment does a ProxySG have potential visibility to all traffic through the use of a device such as WCCP-capable router or a Layer 4 switch? (Choose the best answer.)
What must the virtual URL point to, when the ProxySG utilizes a virtual URL for user authentication in a transparent deployment? (Choose the best answer.)
What does the authentication mode specify? (Choose the best answer.)
What are two (2) access methods to the ProxySG? (Choose two.)
Which log format is associated with the main log facility by default? (Choose the best answer.)
Which section of the sysinfo file would an administrator examine to see how specific components are behaving? (Choose the best answer.)
How does a server know where to retrieve the requested information when it receives a GET request method? (Choose the best answer.)
Which two (2) categories of traffic are typically left encrypted? (Choose two.)