In a escenario using web proxy how many session tcp are created?
Responda
Two TCP connections are created: one from the client to the web proxy and one from the web proxy to the server.
Four TCP connections are created: two from the client to the web proxy and two from the web proxy to the server.
Questão 2
Questão
How is an explicit web proxy different from a transparent web proxy?
Responda
When you use explicit web proxy, you must configure clients to send the requests to the web proxy IP address and port number, not the website's servers.
When you use explicit web proxy, you must configure clients to send the requests to the website's servers IP address and port number, not the web proxy.
Questão 3
Questão
Web cache is supported in both:
Responda
transparent and explicit web proxy modes.
transparent mode and NAT mode
Questão 4
Questão
Configuring Web Browsers for Explicit Proxy
There are three methods for configuration:
Responda
Browser settings
Proxy automatic configuration (PAC) file
Web proxy autodiscovery protocol (WPAD)
Active Directory tool FSSO
Authentication policy based
Questão 5
Questão
Which is an advantage of transparent web proxy over explicit web proxy?
Responda
a. PAC files can be used to specify which proxy to use.
b. Web browsers do not need to be configured to use the proxy.
Questão 6
Questão
Which of the following is a WPAD methods?
Responda
a. LDAP query
b. DHCP query
Questão 7
Questão
Proxy address type
Responda
Address type
Source address
Host address
destination address
Questão 8
Questão
Which of the following is required for redirecting user traffic to the transparent web proxy?
Responda
a. Traffic must match a firewall policy with a proxy option profile with the HTTP Policy Redirect setting enabled.
b. Traffic must match a firewall policy with the action set to proxy.
Questão 9
Questão
Which of the following configuration objects can be used to filter web proxy traffic, based on the HTTP header information?
Responda
a. FQDN addresses
b. Proxy addresses
Questão 10
Questão
Web proxy authentication can be based on either:
Responda
source IP address.
HTTP session.
HTTP IP address.
source session.
Questão 11
Questão
What is included in the configuration of an authentication scheme?
Responda
a. Authentication method
b. Source IP address
Questão 12
Questão
Which of the following is an advantage of IP—based authentication over session—based?
Responda
a. It supports multiple users sharing the same IP address.
b. It requires less memory.
Quer criar seus próprios Quizzesgratuitos com a GoConqr? Saiba mais.