Which of the following steps are not required when configuring a transparently deployed ProxySG to intercept HTTPS traffic?
A) Create a SSL intercept layer in the VPM.
B) Enable a SSL service on port 443.
C) Assign a key ring to the SSL proxy.
D) Create a SSL access layer in the VPM.
Correct Answer:
Verified
Q64: What type of authentication challenge is issued
Q65: Log format variable rs(Content-Type) always refers to
Q66: Which server certificate validation errors can be
Q67: When configuring reverse proxy with SSL, what
Q68: Which authentication modes would result in a
Q70: Which of the following is NOT true
Q71: Which types of requests are likely to
Q72: When configuring Blue Coat Director, how can
Q73: Apparent Data Type objects can be created
Q74: What are the possible ways of creating
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents