What causes authentication failures on a Cisco WSA when LDAP is used for authentication?

What causes authentication failures on a Cisco WSA when LDAP is used for authentication?A . when the passphrase contains only 5 charactersB . when the passphrase contains characters that are not 7-bit ASCIC . when the passphrase contains one of following characters ‘@ # $ % ^’D . when the...

July 11, 2020 No Comments READ MORE +

Which two configuration options are available on a Cisco WSA within a decryption policy? (Choose two.)

Which two configuration options are available on a Cisco WSA within a decryption policy? (Choose two.)A . Pass ThroughB . WarnC . DecryptD . AllowE . BlockView AnswerAnswer: AC Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01011.html

July 9, 2020 No Comments READ MORE +

Which statement about the transaction log is true?

Refer to the exhibit. Which statement about the transaction log is true?A . The log does not have a date and timeB . The proxy had the content and did not contact other serversC . The transaction used TCP destination port 8187D . The AnalizeSuspectTraffic policy group was applied to...

July 8, 2020 No Comments READ MORE +

Which method is used by AMP against zero-day and targeted file-based attacks?

Which method is used by AMP against zero-day and targeted file-based attacks?A . analyzing behavior of all files that are not yet known to the reputation serviceB . periodically evaluating emerging threats as new information becomes availableC . implementing security group tagsD . obtaining the reputation of known filesView AnswerAnswer:...

July 8, 2020 No Comments READ MORE +

Which two parameters are mandatory to control access to websites with proxy authentication on a Cisco WSA? (Choose two.)

Which two parameters are mandatory to control access to websites with proxy authentication on a Cisco WSA? (Choose two.)A . External AuthenticationB . Identity Enabled AuthenticationC . Transparent User IdentificationD . Credential EncryptionE . Authentication RealmView AnswerAnswer: DE Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_appendix_010111.html

July 6, 2020 No Comments READ MORE +

What is used to configure WSA as an explicit proxy?

What is used to configure WSA as an explicit proxy?A . IP Spoofing from routerB . Network settings from user browserC . WCCP redirection from firewallD . Auto redirection using PBR from switchView AnswerAnswer: B Explanation: Reference: https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/117940-qa-wsa­00.html

July 5, 2020 No Comments READ MORE +

Which statement about the SOCKS proxy is true?

Which statement about the SOCKS proxy is true?A . SOCKS is a general purpose proxyB . SOCKS operates on TCP port 80, 443, and 8334C . SOCKS is used only for traffic that is redirected through a firewallD . SOCKS is used for UDP traffic onlyView AnswerAnswer: A Explanation: Reference:...

July 3, 2020 No Comments READ MORE +

Which two features can be used with an upstream and downstream Cisco WSA web proxy to have the upstream WSA identify users by their client IP address? (Choose two.)

Which two features can be used with an upstream and downstream Cisco WSA web proxy to have the upstream WSA identify users by their client IP address? (Choose two.)A . X-Forwarded-ForB . high availabilityC . web cacheD . viaE . IP spoofingView AnswerAnswer: AD Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_0100.html

July 3, 2020 No Comments READ MORE +

What are all of the available options for configuring an exception to blocking for referred content?

What are all of the available options for configuring an exception to blocking for referred content?A . all embedded/referred and all embedded/referred exceptB . selected embedded/referred except, all embedded/referred, and selected embedded/referredC . selected embedded/referred and all embedded/referred exceptD . all embedded/referred, selected embedded/referred, and all embedded/referred exceptView AnswerAnswer: D...

June 30, 2020 No Comments READ MORE +

Drag and drop the Cisco WSA methods from the left onto the correct deployment modes on the right

DRAG DROP Drag and drop the Cisco WSA methods from the left onto the correct deployment modes on the right. View AnswerAnswer: Explanation: You could use an explicit setting (browser config/PAC/WPAD) or transparent (WCCP/PBR) to point to the first proxy and then the first proxy will route based on category...

June 30, 2020 No Comments READ MORE +