Cisco 700-281 - Web Security for Field Engineers Exam
Page: 2 / 10
Total 50 questions
Question #6 (Topic: )
Which of these cannot be used in defining policies?
A. User agent
B. Proxy port
C. Usage quotas
D. Time of day
Answer: C
Question #7 (Topic: )
If authentication is enabled, which statement is true?
A. Client reports will display both the username and IP address of the clients
B. Client reports will display the IP address of the authentication server.
C. Client reports are not affected by authentication.
D. Client reports will display authenticated usernames.
Answer: D
Question #8 (Topic: )
What is "stream scanning"?
A. scanning streaming media for malware
B. passing pieces of a download to the client while the download is being scanned
C. scanning multiple downloads at the same time
D. passing scanned pieces of the file between two different malware-scanning engines
Answer: B
Question #9 (Topic: )
Which of these is not used as a monitoring tool?
A. CLI commands
B. email alerts
C. SNMP traps
D. policy trace
Answer: D
Question #10 (Topic: )
Which option describes how a user enables licensed features on the virtual WSA?
A. from the CLI using the featurekey command
B. from the CLI using the loadlicense command
C. from the CLI using the update command
D. from the GUI using the System Administration/Feature Keys menu page
E. from the GUI using the System Administration/Feature Key Settings menu page
Answer: B