Cisco 300-725 - Securing the Web with Cisco Web Security Appliance (300-725 SWSA) Exam

Question #6 (Topic: Single Topic)
Which two configuration options are available on a Cisco WSA within a decryption policy? (Choose two.)
A. Pass Through B. Warn C. Decrypt D. Allow E. Block
Answer: AC
Question #7 (Topic: Single Topic)
Which information in the HTTP request is used to determine if it is subject to the referrer exceptions feature in the Cisco WSA?
A. protocol B. version C. header D. payload
Answer: C
Question #8 (Topic: Single Topic)
What is used to configure WSA as an explicit proxy?
A. IP Spoofing from router B. Network settings from user browser C. WCCP redirection from firewall D. Auto redirection using PBR from switch
Answer: B
Question #9 (Topic: Single Topic)
Which key is needed to pair a Cisco WSA and Cisco ScanCenter for CTA?
A. public SSH key that the Cisco WSA generates B. public SSH key that Cisco ScanCenter generates C. private SSH key that Cisco ScanCenter generates D. private SSH key that the Cisco WSA generates
Answer: A
Question #10 (Topic: Single Topic)
What is a benefit of integrating Cisco Cognitive Threat Analytics with a Cisco WSA?
A. It adds additional information to the Cisco WSA reports B. It adds additional malware protection to the Cisco WSA C. It provides the ability to use artificial intelligence to block viruses D. It reduces time to identify threats in the network
Answer: B
Download Exam
Page: 2 / 12
Total 60 questions