- All Exams Instant Download
What causes authentication failures on a Cisco WSA when LDAP is used for authentication?
What causes authentication failures on a Cisco WSA when LDAP is used for authentication?A . when the passphrase contains only 5 charactersB . when the passphrase contains characters that are not 7-bit ASCIC . when the passphrase contains one of following characters ‘@ # $ % ^’D . when the...
Which two configuration options are available on a Cisco WSA within a decryption policy? (Choose two.)
Which two configuration options are available on a Cisco WSA within a decryption policy? (Choose two.)A . Pass ThroughB . WarnC . DecryptD . AllowE . BlockView AnswerAnswer: AC Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01011.html
Which statement about the transaction log is true?
Refer to the exhibit. Which statement about the transaction log is true?A . The log does not have a date and timeB . The proxy had the content and did not contact other serversC . The transaction used TCP destination port 8187D . The AnalizeSuspectTraffic policy group was applied to...
Which method is used by AMP against zero-day and targeted file-based attacks?
Which method is used by AMP against zero-day and targeted file-based attacks?A . analyzing behavior of all files that are not yet known to the reputation serviceB . periodically evaluating emerging threats as new information becomes availableC . implementing security group tagsD . obtaining the reputation of known filesView AnswerAnswer:...
Which two parameters are mandatory to control access to websites with proxy authentication on a Cisco WSA? (Choose two.)
Which two parameters are mandatory to control access to websites with proxy authentication on a Cisco WSA? (Choose two.)A . External AuthenticationB . Identity Enabled AuthenticationC . Transparent User IdentificationD . Credential EncryptionE . Authentication RealmView AnswerAnswer: DE Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_appendix_010111.html
What is used to configure WSA as an explicit proxy?
What is used to configure WSA as an explicit proxy?A . IP Spoofing from routerB . Network settings from user browserC . WCCP redirection from firewallD . Auto redirection using PBR from switchView AnswerAnswer: B Explanation: Reference: https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/117940-qa-wsa00.html
Which statement about the SOCKS proxy is true?
Which statement about the SOCKS proxy is true?A . SOCKS is a general purpose proxyB . SOCKS operates on TCP port 80, 443, and 8334C . SOCKS is used only for traffic that is redirected through a firewallD . SOCKS is used for UDP traffic onlyView AnswerAnswer: A Explanation: Reference:...
Which two features can be used with an upstream and downstream Cisco WSA web proxy to have the upstream WSA identify users by their client IP address? (Choose two.)
Which two features can be used with an upstream and downstream Cisco WSA web proxy to have the upstream WSA identify users by their client IP address? (Choose two.)A . X-Forwarded-ForB . high availabilityC . web cacheD . viaE . IP spoofingView AnswerAnswer: AD Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_0100.html
What are all of the available options for configuring an exception to blocking for referred content?
What are all of the available options for configuring an exception to blocking for referred content?A . all embedded/referred and all embedded/referred exceptB . selected embedded/referred except, all embedded/referred, and selected embedded/referredC . selected embedded/referred and all embedded/referred exceptD . all embedded/referred, selected embedded/referred, and all embedded/referred exceptView AnswerAnswer: D...
Drag and drop the Cisco WSA methods from the left onto the correct deployment modes on the right
DRAG DROP Drag and drop the Cisco WSA methods from the left onto the correct deployment modes on the right. View AnswerAnswer: Explanation: You could use an explicit setting (browser config/PAC/WPAD) or transparent (WCCP/PBR) to point to the first proxy and then the first proxy will route based on category...