The backup/restore options in the Maintenance section of the Appliance Manager are used to backup and restore _____ .
A. log files only
B. configuration files only
C. log files and configuration files
D. specified cached data
Which one of the following methods can be used to manage the NetCache appliance but cannot be used to access the Command Line Interface (CLI)?
A. Console
B. Telnet
C. rsh
D. HTTP
Once created, NetCache groups _____.
A. may not be edited
B. must be used for authentication
C. are required to match existing groups on the authentication server
D. may be edited to revise names, permissions, or ACLs
When sending a packet beyond the local area network, the NetCache uses all of the following EXCEPT _____ to decide which router to send the packet to.
A. static routing table
B. ICMP redirects
C. OSPF routing updates
D. RIP routing updates
The NetCache appliance's clock can ________ and ________
A. NOT be synchronized with a remote server
B. be synchronized with NTP servers
C. be synchronized with Windows domain controllers
D. be synchronized with RDATE servers
If the auth ftp command is used in a proxy configured environment, the appliance will _____ .
A. allow FTP requests and execute the remaining FTP ACLs
B. authenticate all FTP requests
C. allow FTP requests and bypass the remaining FTP ACLs enable/disable FTP over HTTPS
D. ignore ACLs for FTP over HTTP
A C2100 appliance uses _____ to _____ disk drives.
A. one, seven
B. two, seven
C. one, three
D. two, three
The configure "Shared User Hosts" feature under the Appliance Manager's Setup > FTP > Caching Behavior is used to specify:_____ .
A. FTP servers from which fetched objects will be cached and served without a user- specific key requirement in order to increase the caching efficiency
B. a subset of FTP servers that will be accelerated by the NetCache appliance
C. a subset of FTP servers that can be bound to a shared virtual IP address in order to increase overall caching efficiency
D. a shared IP address that all requesting clients will use to circumvent any authentication or user-specific key requirements on the backend FTP servers
Which one of the following actions cannot be accomplished from the NetCache command line?
A. Download software
B. Kick off telnet users
C. Set root password
D. Eject objects from the NetCache
The traceroute command is used to ____ .
A. report interface activity in Kbps
B. show the state of each interface
C. print the route packets take to a network host
D. display a list of active sockets for each protocol