If a user agent that does not support authentication tries to request content through a connection on which the ProxySG requires authentication, how can you best resolve the issue?
A) Identify the TCP ports used by the user agent, and create a proxy service to bypass such traffic.
B) Identify an HTTP header that identifies the user agent, and then write policy to exempt matching transactions from authentication.
C) Identify the IP address of the user agent, and then write policy to exempt matching transactions from authentication.
D) You cannot do this.
Correct Answer:
Verified
Q108: If the ProxySG and a client cannot
Q109: Which one of these statements best describes
Q110: In a typical client HTTP request, identify
Q111: When creating a policy-driven trace, which CPL
Q112: In CPL, what is the difference between
Q114: Without asking a user or physically inspecting
Q115: What are the three levels of the
Q116: When a downstream ProxySG requests an object
Q117: What type of filesystem does SGOS use?
A)
Q118: In CPL, rules that have similar syntax
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents