A. The challenge type and the accepted surrogate
B. The protocol used to communicate with the authentication server
C. The time-to-live for credentials
D. Whether the credentials will be encrypted
A. Ability to use Kerberos credentials
B. Better performance by using NTLM credentials
C. Greater security than LDAP
D. Single sign-on experience for users
A. Never
B. Only in transparent mode
C. When policy is being evaluated
D. Only in explicit mode
A. Detect Protocol
B. Port 443
C. Enable ADN
D. Early Intercept
A. From the exception definition stored on the ProxySG
B. From Symantec Technical Support
C. From the VPM-XML file
D. From WebPulse
A. Source
B. Track
C. Destination
D. Action
A. System state statistics
B. Logs
C. Health check statistics
D. Snapshots