Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 300-725 - Securing the Web with Cisco Web Security Appliance (300-725 SWSA)

Page: 1 / 2
Total 60 questions

Drag and drop the actions from the left into the correct order on the right in which they occur as an HTTPS session passes through the Cisco WSA.

What is the function of a PAC file on a Cisco WSA?

A.

The file allows redirection of web traffic to a specific proxy server

B.

The file is mandatory for a transparent proxy to redirect user traffic

C.

The file provides instructions about which URL categories are permitted

D.

The file is mandatory for an explicit proxy to forward user traffic

Which configuration mode does the Cisco WSA use to create an Active Directory realm for Kerberos authentication?

A.

Forward

B.

Connector

C.

Transparent

D.

Standard

Which statement about configuring an identification profile for machine authentication is true?

A.

Cloud Web Security Connector mode with an active directory enabled supports machine authentication

B.

Identification profile machine ID is supported locally, but the Cisco WSA does not support machine ID authentication

C.

Cloud Web Security with Kerberos enabled supports machine authentication

D.

If an Active Directory realm is used, identification can be performed for an authenticated user or IP address but not for a machine ID

Which configuration option is suitable for explicit mode deployment?

A.

PAC

B.

WCCP

C.

ITD

D.

PBR

What is used to configure WSA as an explicit proxy?

A.

IP Spoofing from router

B.

Network settings from user browser

C.

WCCP redirection from firewall

D.

Auto redirection using PBR from switch

What is a benefit of integrating Cisco Cognitive Threat Analytics with a Cisco WSA?

A.

It adds additional information to the Cisco WSA reports

B.

It adds additional malware protection to the Cisco WSA

C.

It provides the ability to use artificial intelligence to block viruses

D.

It reduces time to identify threats in the network

What must be configured first when creating an access policy that matches the Active Directory group?

A.

authentication, authorization, and accounting of groups

B.

FQDN specification

C.

authentication realm

D.

authorized groups specification

Which response code in the access logs indicates that a transaction was blocked due to policy?

A.

TCP_DENIED/407

B.

TCP_DENIED/401

C.

TCP_DENIED/403

D.

TCP_DENIED/307

Which type of FTP proxy does the Cisco WSA support?

A.

non-native FTP

B.

FTP over UDP tunneling

C.

FTP over HTTP

D.

hybrid FTP