لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which two types of reports are scheduled on the Cisco WSA to analyze traffic? (Choose two.)
A. uthentication, authorization, and accounting of groups
B. QDN specification
C. uthentication realm
D. uthorized groups specification
عرض الإجابة
اجابة صحيحة: AD
السؤال #2
What is required on the Cisco WSA when an AMP file reputation server private cloud is configured?
A. private key from the server to encrypt messages
B. private key to decrypt messages
C. public and private keys from the server
D. public key from the server
عرض الإجابة
اجابة صحيحة: D
السؤال #3
DRAG DROPDrag and drop the Cisco WSA methods from the left onto the correct deployment modes on the right.Select and Place:Exhibit A: Exhibit B:
A. lease refer to Exhibit B for answer
عرض الإجابة
اجابة صحيحة: A
السؤال #4
What is the primary benefit of using Cisco Advanced Web Security Reporting?
A. bility to see the malicious activity of a user
B. 4TM report with client-malware risk
C. entralized and granular reporting
D. ccess to a day report with historical data
عرض الإجابة
اجابة صحيحة: B
السؤال #5
06. Which two configuration options can be configured when invalid certificates are processed with the HTTPS proxy on WSA enabled?
A. llow
B. oni
C. rop
D. lock
عرض الإجابة
اجابة صحيحة: BC
السؤال #6
What is a benefit of integrating Cisco WSA with TrustSec in ISE?
A. he policy trace tool can be used to match access policies using specific SGT
B. raffic of authenticated users who use 802
C. SE can block authentication for users who generate multiple sessions using suspect TCP ports
D. sers in a specific SGT can be denied access to certain social websites
عرض الإجابة
اجابة صحيحة: D
السؤال #7
01. Which action is a valid default for the Global Access Policy in the Application Visibility Control engine on the Cisco WSA?
A. andwidthlimi
B. ermi
C. estric
D. oni
عرض الإجابة
اجابة صحيحة: D
السؤال #8
Which key is needed to pair a Cisco WSA and Cisco ScanCenter for CTA?
A. ublic SSH key that the Cisco WSA generates
B. ublic SSH key that Cisco ScanCenter generates
C. rivate SSH key that Cisco ScanCenter generates
D. rivate SSH key that the Cisco WSA generates
عرض الإجابة
اجابة صحيحة: A
السؤال #9
Which two configuration options are available on a Cisco WSA within a decryption policy? (Choose two.)
A. rotocol
B. ersion
C. eader
D. ayload
عرض الإجابة
اجابة صحيحة: AC
السؤال #10
07. When a Cisco WSA is installed with default settings, which port is assigned to the web proxy if the M1 port is used exclusively for management?
A. 1
B. 2
C. 2
D. 1
عرض الإجابة
اجابة صحيحة: D
السؤال #11
Which method is used by AMP against zero-day and targeted file-based attacks?
A. nalyzing behavior of all files that are not yet known to the reputation service
B. eriodically evaluating emerging threats as new information becomes available
C. mplementing security group tags
D. btaining the reputation of known files
عرض الإجابة
اجابة صحيحة: D
السؤال #12
When an access policy is created, what is the default option for the Application Settings?
A. se Global Policy Applications Settings
B. efine the Applications Custom Setting
C. et all applications to Block
D. et all applications to Monitor
عرض الإجابة
اجابة صحيحة: B
السؤال #13
09. How does dynamic content analysis improve URL categorization?
A. tanalyzescontentbasedoncacheddestinationconte
B. taddsintelligencetodetectcategoriesbyanalyzingresponse
C. tcanbeusedastheonlyURLanalysismethod
D. tanalyzescontentofcategorizedURLtotunedecisionsandcorrectcategorizatione
عرض الإجابة
اجابة صحيحة: D
السؤال #14
DRAG DROPDrag and drop the properties from the left onto the correct advanced web proxy setting descriptions on the right. Select and Place:Exhibit A:Exhibit B:
A. lease refer to Exhibit B for answer
عرض الإجابة
اجابة صحيحة: A
السؤال #15
Which behavior is seen while the policy trace tool is used to troubleshoot a Cisco WSA?
A. xternal DLP polices are evaluated by the tool
B. real client request is processed and an EUN page is displayed
C. OCKS policies are evaluated by the tool
D. he web proxy does not record the policy trace test requests in the access log when the tool is in use
عرض الإجابة
اجابة صحيحة: D
السؤال #16
A network administrator noticed that all traffic that is redirected to the Cisco WSA from the Cisco ASA firewall cannot get to the Internet in a Transparent proxy environment using WCCP.Which troubleshooting action must be taken on the CLI to make sure that WCCP communication is not failing?
A. Disable WCCP to see if the WCCP service is causing the issue
B. Explicitly point the browser to the proxy
C. Ping the WCCP device
D. Check WCCP logs in debug mode
عرض الإجابة
اجابة صحيحة: D
السؤال #17
DRAG DROPDrag and drop the actions from the left into the correct order on the right in which they occur as an HTTPS session passes through the Cisco WS
A. elect and Place:Exhibit A: Exhibit B:A
عرض الإجابة
اجابة صحيحة: A
السؤال #18
Which configuration mode does the Cisco WSA use to create an Active Directory realm for Kerberos authentication?
A. Forward
B. Connector
C. Transparent
D. Standard
عرض الإجابة
اجابة صحيحة: D
السؤال #19
Which action is a valid default for the Global Access Policy in the Application Visibility Control engine on the Cisco WSA?
A. bandwidth limit
B. permit
C. restrict
D. monitor
عرض الإجابة
اجابة صحيحة: D
السؤال #20
03. Which port is configured in a browser to use the Cisco WSA web proxy with default settings?
A. 128
B. 443
C. 021
D. 080
عرض الإجابة
اجابة صحيحة: A
السؤال #21
02. Which two log types does the Cisco WSA provide to troubleshoot Cisco data security and external data loss prevention policies?
A. ploaddata
B. atasecurity
C. efaultproxy
D. ataacce
عرض الإجابة
اجابة صحيحة: C
السؤال #22
When a Cisco WSA is installed with default settings, which port is assigned to the web proxy if the M1 port is used exclusively for management?
A. 1
B. 2
C. 2
D. 1
عرض الإجابة
اجابة صحيحة: D
السؤال #23
Refer to the exhibit. Which statement about the transaction log is true?
A. he log does not have a date and time
B. he proxy had the content and did not contact other servers
C. he transaction used TCP destination port 8187
D. he AnalizeSuspectTraffic policy group was applied to the transaction
عرض الإجابة
اجابة صحيحة: D
السؤال #24
Which certificate format does a Cisco WSA need when HTTPS proxy is configured?
A. ER
B. ER
C. EM
D. RL
عرض الإجابة
اجابة صحيحة: C
السؤال #25
Which statement about the SOCKS proxy is true?
A. OCKS is a general purpose proxy
B. OCKS operates on TCP port 80, 443, and 8334
C. OCKS is used only for traffic that is redirected through a firewall
D. OCKS is used for UDP traffic only
عرض الإجابة
اجابة صحيحة: A
السؤال #26
Which port is configured in a browser to use the Cisco WSA web proxy with default settings?
B. 443
C. 021
D. 128
.
عرض الإجابة
اجابة صحيحة: D
السؤال #27
08. Which two types of reports are scheduled on the Cisco WSA to analyze traffic?
A. ayer3trafficmoni
B. RLcategorie
C. oststatistic
D. pplicationvisibility
عرض الإجابة
اجابة صحيحة: BD
السؤال #28
Which command is used to flush a single user from authentication memory?
A. sedata
B. uthcache
C. iagnostic
D. lear
عرض الإجابة
اجابة صحيحة: B
السؤال #29
Which two features on the Cisco WSA help prevent outbound data loss for HTTP or FTP traffic? (Choose two.)
A. web reputation filters
B. Advanced Malware Protection
C. third-party DLP integration
D. data security filters
E. SOCKS proxy
عرض الإجابة
اجابة صحيحة: CD
السؤال #30
Which two modes of operation does the Cisco WSA provide? (Choose two.)
A. connector
B. proxy
C. transparent
D. standard
E. explicit
عرض الإجابة
اجابة صحيحة: CE
السؤال #31
Which statement about Cisco Advanced Web Security Reporting integration is true?
A. WSR uses IP addresses to differentiate Cisco WSA deployments
B. WSR does not require a license to index data
C. WSR can remove log files after they are indexed
D. WSR installation is CLI-based on Windows and Red Hat Linux systems
عرض الإجابة
اجابة صحيحة: D
السؤال #32
Which two parameters are mandatory to control access to websites with proxy authentication on a Cisco WSA? (Choose two.)
A. ear
B. inute
C. our
D. onth
عرض الإجابة
اجابة صحيحة: DE
السؤال #33
05. What is a valid predefined time range when configuring a Web Tracking query?
A. ea
B. inute
C. ou
D. onth
عرض الإجابة
اجابة صحيحة: B
السؤال #34
What causes authentication failures on a Cisco WSA when LDAP is used for authentication?
A. he log does not have a date and time
B. he proxy had the content and did not contact other servers
C. he transaction used TCP destination port 8187
D. he AnalizeSuspectTraffic policy group was applied to the transaction
عرض الإجابة
اجابة صحيحة: B
السؤال #35
What causes authentication failures on a Cisco WSA when LDAP is used for authentication?
A. hen the passphrase contains only 5 characters
B. hen the passphrase contains characters that are not 7-bit ASCI
C. hen the passphrase contains one of following characters ‘@ # $ % ^’
D. hen the passphrase contains 50 characters
عرض الإجابة
اجابة صحيحة: B
السؤال #36
Which statement about identification profile default settings on the Cisco WSA is true?
A. Identification profiles do not require authentication
B. Guest identification profile should be processed first
C. Identification profiles can include only one user group
D. AsyncOS processes identification profiles alphabetically
عرض الإجابة
اجابة صحيحة: A
السؤال #37
What must be configured to require users to click through an acceptance page before they are allowed to go to the Internet through the Cisco WSA?
A. Enable End-User Acknowledgement Page and set to Required in Identification Profiles
B. Enable End -User URL Filtering Warning Page and set to Required in Identification Profiles
C. Enable End-User Acknowledgement Page and set to Required in Access Policies
D. Enable End-User URL Filtering Warning Page and set to Required in Access Policies
عرض الإجابة
اجابة صحيحة: C
السؤال #38
Which configuration option is suitable for explicit mode deployment?
A. AC
B. CCP
C. TD
D. BR
عرض الإجابة
اجابة صحيحة: A
السؤال #39
Which information within Cisco Advanced Web Security Reporting is used to generate a report that lists visited domains?
A. URL categories
B. web reputation
C. websites
D. application visibility
عرض الإجابة
اجابة صحيحة: A
السؤال #40
04. By default, which two pieces of information does the Cisco WSA access log contain?
A. TTPRequestCode
B. ontentType
C. lientIPAddre
D. serAge
عرض الإجابة
اجابة صحيحة: AC
السؤال #41
Refer to the exhibit. Which statement about the transaction log is true?
A. -Forwarded-For
B. igh availability
C. eb cache
D. ia
E. P spoofing
عرض الإجابة
اجابة صحيحة: D
السؤال #42
10. What is the purpose of using AMP file analysis on a Cisco WSA to continuously evaluate emerging threats?
A. otakeappropriateactiononnewfilesthatenterthenetwork
B. oremovefilesfromquarantinebystoppingtheirretentionperiod
C. onotifyyouoffilesthataredeterminedtobethreatsaftertheyhaveenteredyournetwork
D. osendallfilesdownloadedthroughtheCiscoWSAtotheAMPcloud
عرض الإجابة
اجابة صحيحة: C
السؤال #43
Which response code in the access logs indicates that a transaction was blocked due to policy?
A. TCP_DENIED/407
B. TCP_DENIED/401
C. TCP_DENIED/403
D. TCP_DENIED/307
عرض الإجابة
اجابة صحيحة: A
السؤال #44
Which two log types does the Cisco WSA provide to troubleshoot Cisco data security and external data loss prevention policies? (Choose two.)
A. pload data
B. ata security
C. efault proxy
D. ata access
E. xternal data
عرض الإجابة
اجابة صحيحة: CE
السؤال #45
What are all of the available options for configuring an exception to blocking for referred content?
A. ll embedded/referred and all embedded/referred except
B. elected embedded/referred except, all embedded/referred, and selected embedded/referred
C. elected embedded/referred and all embedded/referred except
D. ll embedded/referred, selected embedded/referred, and all embedded/referred except
عرض الإجابة
اجابة صحيحة: D
السؤال #46
Which IP address and port are used by default to run the system setup wizard?
A. http://192
B. https://192
C. https://192
D. http://192
عرض الإجابة
اجابة صحيحة: B
السؤال #47
Which information in the HTTP request is used to determine if it is subject to the referrer exceptions feature in the Cisco WSA?
A. P Spoofing from router
B. etwork settings from user browser
C. CCP redirection from firewall
D. uto redirection using PBR from switch
عرض الإجابة
اجابة صحيحة: C
السؤال #48
What is the function of a PAC file on a Cisco WSA?
A. The file allows redirection of web traffic to a specific proxy server
B. The file is mandatory for a transparent proxy to redirect user traffic
C. The file provides instructions about which URL categories are permitted
D. The file is mandatory for an explicit proxy to forward user traffic
عرض الإجابة
اجابة صحيحة: A
السؤال #49
What is a benefit of integrating Cisco Cognitive Threat Analytics with a Cisco WSA?
A. t adds additional information to the Cisco WSA reports
B. t adds additional malware protection to the Cisco WSA
C. t provides the ability to use artificial intelligence to block viruses
D. t reduces time to identify threats in the network
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: