Which VPM layer can be most commonly used to control decrypting of SSL traffic by authenticated username? (Choose the best answer.)
What are two (2) methods by which the ProxySG can detect the type of a file that is downloaded? (Choose two.)
In which type of physical deployment does a ProxySG have potential visibility to all traffic through the use of a device such as WCCP-capable router or a Layer 4 switch? (Choose the best answer.)
What results when the ProxySG bypasses traffic in explicit mode? (Choose the best answer.)
What does the authentication mode specify? (Choose the best answer.)