لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which statement about identification profile default settings on the Cisco WSA is true?
A. Identification profiles do not require authentication
B. Guest identification profile should be processed first
C. Identification profiles can include only one user group
D. AsyncOS processes identification profiles alphabetically
عرض الإجابة
اجابة صحيحة: D
السؤال #2
Drag and drop the Cisco WSA access policy elements from the left into the order in which they are processed on the right.
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: AD
السؤال #3
How does dynamic content analysis improve URL categorization?
A. It analyzes content based on cached destination content
B. It adds intelligence to detect categories by analyzing responses
C. It can be used as the only URL analysis method
D. It analyzes content of categorized URL to tune decisions and correct categorization errors
عرض الإجابة
اجابة صحيحة: D
السؤال #4
When an access policy is created, what is the default option for the Application Settings?
A. Use Global Policy Applications Settings
B. Define the Applications Custom Setting
C. Set all applications to Block
D. Set all applications to Monitor
عرض الإجابة
اجابة صحيحة: B
السؤال #5
By default, which two pieces of information does the Cisco WSA access log contain? (Choose two.)
A. HTTP Request Code
B. Content Type
C. Client IP Address
D. User Agent
E. Transaction ID
عرض الإجابة
اجابة صحيحة: D
السؤال #6
Which command is used to flush a single user from authentication memory?
A. isedata
B. authcache
C. diagnostic
D. clear
عرض الإجابة
اجابة صحيحة: B
السؤال #7
What is the primary benefit of using Cisco Advanced Web Security Reporting?
A. ability to see the malicious activity of a user
B. L4TM report with client-malware risk
C. centralized and granular reporting
D. access to a day report with historical data
عرض الإجابة
اجابة صحيحة: B
السؤال #8
Which two benefits does AMP provide compared to the other scanning engines on the Cisco WSA? (Choose two.)
A. protection against malware
B. protection against zero-day attacks
C. protection against spam
D. protection against viruses
E. protection against targeted file-based attacks
عرض الإجابة
اجابة صحيحة: BD
السؤال #9
Which information within Cisco Advanced Web Security Reporting is used to generate a report that lists visited domains?
A. URL categories
B. web reputation
C. websites
D. application visibility
عرض الإجابة
اجابة صحيحة: A
السؤال #10
Which statement about the transaction log is true?
A. The log does not have a date and time
B. The proxy had the content and did not contact other servers
C. The transaction used TCP destination port 8187
D. The AnalizeSuspectTraffic policy group was applied to the transaction
عرض الإجابة
اجابة صحيحة: D
السؤال #11
What is a benefit of integrating Cisco WSA with TrustSec in ISE?
A. The policy trace tool can be used to match access policies using specific SGT
B. Traffic of authenticated users who use 802
C. ISE can block authentication for users who generate multiple sessions using suspect TCP ports
D. Users in a specific SGT can be denied access to certain social websites
عرض الإجابة
اجابة صحيحة: CD
السؤال #12
What are all of the available options for configuring an exception to blocking for referred content?
A. all embedded/referred and all embedded/referred except
B. selected embedded/referred except, all embedded/referred, and selected embedded/referred
C. selected embedded/referred and all embedded/referred except
D. all embedded/referred, selected embedded/referred, and all embedded/referred except
عرض الإجابة
اجابة صحيحة: A
السؤال #13
How does the Cisco WSA choose which scanning engine verdict to use when there is more than one verdict?
A. based on the least restrictive verdict
B. based on the most restrictive verdict
C. based on the first verdict returned
D. based on the last verdict returned
عرض الإجابة
اجابة صحيحة: D
السؤال #14
Which port is configured in a browser to use the Cisco WSA web proxy with default settings?
A. 8080
B. 8443
C. 8021
D. 3128
عرض الإجابة
اجابة صحيحة: D
السؤال #15
What is the purpose of using AMP file analysis on a Cisco WSA to continuously evaluate emerging threats?
A. to take appropriate action on new files that enter the network
B. to remove files from quarantine by stopping their retention period
C. to notify you of files that are determined to be threats after they have entered your network
D. to send all files downloaded through the Cisco WSA to the AMP cloud
عرض الإجابة
اجابة صحيحة: D
السؤال #16
Which type of FTP proxy does the Cisco WSA support?
A. non-native FTP
B. FTP over UDP tunneling
C. FTP over HTTP
D. hybrid FTP
عرض الإجابة
اجابة صحيحة: C
السؤال #17
Which method is used by AMP against zero-day and targeted file-based attacks?
A. analyzing behavior of all files that are not yet known to the reputation service
B. periodically evaluating emerging threats as new information becomes available
C. implementing security group tags
D. obtaining the reputation of known files
عرض الإجابة
اجابة صحيحة: C
السؤال #18
Which behavior is seen while the policy trace tool is used to troubleshoot a Cisco WSA?
A. External DLP polices are evaluated by the tool
B. A real client request is processed and an EUN page is displayed
C. SOCKS policies are evaluated by the tool
D. The web proxy does not record the policy trace test requests in the access log when the tool is in use
عرض الإجابة
اجابة صحيحة: D
السؤال #19
Which statement about Cisco Advanced Web Security Reporting integration is true?
A. AWSR uses IP addresses to differentiate Cisco WSA deployments
B. AWSR does not require a license to index data
C. AWSR can remove log files after they are indexed
D. AWSR installation is CLI-based on Windows and Red Hat Linux systems
عرض الإجابة
اجابة صحيحة: D
السؤال #20
Which two configuration options are available on a Cisco WSA within a decryption policy? (Choose two.)
A. Pass Through
B. Warn
C. Decrypt
D. Allow
E. Block
عرض الإجابة
اجابة صحيحة: AC
السؤال #21
Which two sources provide data to Cisco Advanced Web Security Reporting to create dashboards? (Choose two.)
A. Cisco WSA devices
B. Cisco ISE
C. Cisco ASAv
D. Cisco Security MARS
E. Cisco Cloud Web Security gateways
عرض الإجابة
اجابة صحيحة: AE
السؤال #22
Which two types of reports are scheduled on the Cisco WSA to analyze traffic? (Choose two.)
A. Layer 3 traffic monitor
B. URL categories
C. host statistics
D. application visibility
E. system capacity
عرض الإجابة
اجابة صحيحة: AD
السؤال #23
Drag and drop the Cisco WSA methods from the left onto the correct deployment modes on the right.
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: AC
السؤال #24
Which port is configured in a browser to use the Cisco WSA web proxy with default settings?
A. 8440
B. 8443
C. 8021
D. 3128
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: