Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which two configuration options are available on a Cisco WSA within a decryption policy? (Choose two.)

A.

Pass Through

B.

Warn

C.

Decrypt

D.

Allow

E.

Block

What is a valid predefined time range when configuring a Web Tracking query?

A.

year

B.

minute

C.

hour

D.

month

What is used to configure WSA as an explicit proxy?

A.

IP Spoofing from router

B.

Network settings from user browser

C.

WCCP redirection from firewall

D.

Auto redirection using PBR from switch

Which key is needed to pair a Cisco WSA and Cisco ScanCenter for CTA?

A.

public SSH key that the Cisco WSA generates

B.

public SSH key that Cisco ScanCenter generates

C.

private SSH key that Cisco ScanCenter generates

D.

private SSH key that the Cisco WSA generates

What is the primary benefit of using Cisco Advanced Web Security Reporting?

A.

ability to see the malicious activity of a user

B.

L4TM report with client-malware risk

C.

centralized and granular reporting

D.

access to a day report with historical data

What is the purpose of using AMP file analysis on a Cisco WSA to continuously evaluate emerging threats?

A.

to take appropriate action on new files that enter the network

B.

to remove files from quarantine by stopping their retention period

C.

to notify you of files that are determined to be threats after they have entered your network

D.

to send all files downloaded through the Cisco WSA to the AMP cloud

Which two types of reports are scheduled on the Cisco WSA to analyze traffic? (Choose two.)

A.

Layer 3 traffic monitor

B.

URL categories

C.

host statistics

D.

application visibility

E.

system capacity

Which two parameters are mandatory to control access to websites with proxy authentication on a Cisco WSA? (Choose two.)

A.

External Authentication

B.

Identity Enabled Authentication

C.

Transparent User Identification

D.

Credential Encryption

E.

Authentication Realm