In a escenario using web proxy how many session tcp are created?
Answer
Two TCP connections are created: one from the client to the web proxy and one from the web proxy to the server.
Four TCP connections are created: two from the client to the web proxy and two from the web proxy to the server.
Question 2
Question
How is an explicit web proxy different from a transparent web proxy?
Answer
When you use explicit web proxy, you must configure clients to send the requests to the web proxy IP address and port number, not the website's servers.
When you use explicit web proxy, you must configure clients to send the requests to the website's servers IP address and port number, not the web proxy.
Question 3
Question
Web cache is supported in both:
Answer
transparent and explicit web proxy modes.
transparent mode and NAT mode
Question 4
Question
Configuring Web Browsers for Explicit Proxy
There are three methods for configuration:
Answer
Browser settings
Proxy automatic configuration (PAC) file
Web proxy autodiscovery protocol (WPAD)
Active Directory tool FSSO
Authentication policy based
Question 5
Question
Which is an advantage of transparent web proxy over explicit web proxy?
Answer
a. PAC files can be used to specify which proxy to use.
b. Web browsers do not need to be configured to use the proxy.
Question 6
Question
Which of the following is a WPAD methods?
Answer
a. LDAP query
b. DHCP query
Question 7
Question
Proxy address type
Answer
Address type
Source address
Host address
destination address
Question 8
Question
Which of the following is required for redirecting user traffic to the transparent web proxy?
Answer
a. Traffic must match a firewall policy with a proxy option profile with the HTTP Policy Redirect setting enabled.
b. Traffic must match a firewall policy with the action set to proxy.
Question 9
Question
Which of the following configuration objects can be used to filter web proxy traffic, based on the HTTP header information?
Answer
a. FQDN addresses
b. Proxy addresses
Question 10
Question
Web proxy authentication can be based on either:
Answer
source IP address.
HTTP session.
HTTP IP address.
source session.
Question 11
Question
What is included in the configuration of an authentication scheme?
Answer
a. Authentication method
b. Source IP address
Question 12
Question
Which of the following is an advantage of IP—based authentication over session—based?
Answer
a. It supports multiple users sharing the same IP address.