Which two parameters are mandatory to control access to websites with proxy authentication on a Cisco WSA? (Choose two.)

Which two parameters are mandatory to control access to websites with proxy authentication on a Cisco WSA? (Choose two.)A . External AuthenticationB . Identity Enabled AuthenticationC . Transparent User IdentificationD . Credential EncryptionE . Authentication Realm View Answer Answer: DE Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_appendix_010111.html...

Which two features can be used with an upstream and downstream Cisco WSA web proxy to have the upstream WSA identify users by their client IP address? (Choose two.)

Which two features can be used with an upstream and downstream Cisco WSA web proxy to have the upstream WSA identify users by their client IP address? (Choose two.)A . X-Forwarded-ForB . high availabilityC . web cacheD . viaE . IP spoofing View Answer Answer: AD Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_0100.html...

What are all of the available options for configuring an exception to blocking for referred content?

What are all of the available options for configuring an exception to blocking for referred content?A . all embedded/referred and all embedded/referred exceptB . selected embedded/referred except, all embedded/referred, and selected embedded/referredC . selected embedded/referred and all embedded/referred exceptD . all embedded/referred, selected embedded/referred, and all embedded/referred except View Answer Answer: D Explanation: Reference:...