Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

An administrator wants to restrict file uploads to Facebook using the AVC feature.

Under which two actions must the administrator apply this restriction to an access policy? (Choose two.)

A.

Monitor Facebook General

B.

Monitor Social Networking

C.

Monitor Facebook Photos and Videos

D.

Monitor Facebook Messages and Chat

E.

Monitor Facebook Application

Which method is used by AMP against zero-day and targeted file-based attacks?

A.

analyzing behavior of all files that are not yet known to the reputation service

B.

periodically evaluating emerging threats as new information becomes available

C.

implementing security group tags

D.

obtaining the reputation of known files

A network administrator noticed that all traffic that is redirected to the Cisco WSA from the Cisco ASA firewall cannot get to the Internet in a Transparent proxy environment using WCCP.

Which troubleshooting action must be taken on the CLI to make sure that WCCP communication is not failing?

A.

Disable WCCP to see if the WCCP service is causing the issue

B.

Explicitly point the browser to the proxy

C.

Ping the WCCP device

D.

Check WCCP logs in debug mode

What is a benefit of integrating Cisco WSA with TrustSec in ISE?

A.

The policy trace tool can be used to match access policies using specific SGT

B.

Traffic of authenticated users who use 802.1x can be tagged with SGT to identification profiles in a Cisco WSA

C.

ISE can block authentication for users who generate multiple sessions using suspect TCP ports

D.

Users in a specific SGT can be denied access to certain social websites.

By default, which two pieces of information does the Cisco WSA access log contain? (Choose two.)

A.

HTTP Request Code

B.

Content Type

C.

Client IP Address

D.

User Agent

E.

Transaction ID

Which statement about the SOCKS proxy is true?

A.

SOCKS is a general purpose proxy

B.

SOCKS operates on TCP port 80, 443, and 8334

C.

SOCKS is used only for traffic that is redirected through a firewall

D.

SOCKS is used for UDP traffic only

Which two features on the Cisco WSA help prevent outbound data loss for HTTP or FTP traffic? (Choose two.)

A.

web reputation filters

B.

Advanced Malware Protection

C.

third-party DLP integration

D.

data security filters

E.

SOCKS proxy

Drag and drop the Cisco WSA access policy elements from the left into the order in which they are processed on the right.

Which configuration mode does the Cisco WSA use to create an Active Directory realm for Kerberos authentication?

A.

Forward

B.

Connector

C.

Transparent

D.

Standard

Refer to the exhibit.

Which statement about the transaction log is true?

A.

The log does not have a date and time

B.

The proxy had the content and did not contact other servers

C.

The transaction used TCP destination port 8187

D.

The AnalizeSuspectTraffic policy group was applied to the transaction