Which two configuration options are available on a Cisco WSA within a decryption policy? (Choose two.)
A. Pass Through
B. Warn
C. Decrypt
D. Allow
E. Block
What is used to configure WSA as an explicit proxy?
A. IP Spoofing from router
B. Network settings from user browser
C. WCCP redirection from firewall
D. Auto redirection using PBR from switch
Which method is used by AMP against zero-day and targeted file-based attacks?
A. analyzing behavior of all files that are not yet known to the reputation service
B. periodically evaluating emerging threats as new information becomes available
C. implementing security group tags
D. obtaining the reputation of known files
Which two parameters are mandatory to control access to websites with proxy authentication on a Cisco WSA? (Choose two.)
A. External Authentication
B. Identity Enabled Authentication
C. Transparent User Identification
D. Credential Encryption
E. Authentication Realm
Which configuration option is suitable for explicit mode deployment?
A. PAC
B. WCCP
C. ITD
D. PBR
By default, which two pieces of information does the Cisco WSA access log contain? (Choose two.)
A. HTTP Request Code
B. Content Type
C. Client IP Address
D. User Agent
E. Transaction ID
Which two caches must be cleared on a Cisco WSA to resolve an issue in processing requests? (Choose two.)
A. authentication cache
B. application cache
C. logging cache
D. DNS cache
E. HTTP cache
Which statement about configuring an identification profile for machine authentication is true?
A. Cloud Web Security Connector mode with an active directory enabled supports machine authentication
B. Identification profile machine ID is supported locally, but the Cisco WSA does not support machine ID authentication
C. Cloud Web Security with Kerberos enabled supports machine authentication
D. If an Active Directory realm is used, identification can be performed for an authenticated user or IP address but not for a machine ID
Which statement about identification profile default settings on the Cisco WSA is true?
A. Identification profiles do not require authentication
B. Guest identification profile should be processed first
C. Identification profiles can include only one user group
D. AsyncOS processes identification profiles alphabetically
What is the default action when a new custom category is created and added to an access policy?
A. monitor
B. allow
C. block
D. decrypt
An administrator wants to restrict file uploads to Facebook using the AVC feature.
Under which two actions must the administrator apply this restriction to an access policy? (Choose two.)
A. Monitor Facebook General
B. Monitor Social Networking
C. Monitor Facebook Photos and Videos
D. Monitor Facebook Messages and Chat
E. Monitor Facebook Application
How does dynamic content analysis improve URL categorization?
A. It analyzes content based on cached destination content
B. It adds intelligence to detect categories by analyzing responses
C. It can be used as the only URL analysis method
D. It analyzes content of categorized URL to tune decisions and correct categorization errors
Which type of certificate must be installed on a Cisco WSA for HTTPS inspection?
A. server
B. client
C. root
D. wildcard
Which two log types does the Cisco WSA provide to troubleshoot Cisco data security and external data loss prevention policies? (Choose two.)
A. upload data
B. data security
C. default proxy
D. data access
E. external data
DRAG DROP
Drag and drop the access policy options from the left onto the correct descriptions on the right.
Select and Place: