لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which two configuration options can be configured when invalid certificates are processed with the HTTPS proxy on WSA enabled? (Choose two.)
A. allow
B. monitor
C. drop
D. block
E. redirect
عرض الإجابة
اجابة صحيحة: B
السؤال #2
Which two caching modes are available in the Cisco WSA? (Choose two.) https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-5/user_guide/ b_WSA_UserGuide_11_5_1/b_WSA_UserGuide_11_5_1_chapter_0100.html#task_1214899
A. ctive cache
B. ll cache
C. ggressive cache
D. afe cache
E. o cache
عرض الإجابة
اجابة صحيحة: CD
السؤال #3
What must be configured to require users to click through an acceptance page before they are allowed to go to the Internetthrough the Cisco WSA?
A. Enable End-User Acknowledgement Page and set to Required in Identification Profiles
B. Enable End -User URL Filtering Warning Page and set to Required in Identification Profiles
C. Enable End-User Acknowledgement Page and set to Required in Access Policies
D. Enable End-User URL Filtering Warning Page and set to Required in Access Policies
عرض الإجابة
اجابة صحيحة: C
السؤال #4
What must be configured first when creating an access policy that matches the Active Directory group?
A. authentication, authorization, and accounting of groups
B. FQDN specification
C. authentication realm
D. authorized groups specification
عرض الإجابة
اجابة صحيحة: C
السؤال #5
An administrator wants to restrict file uploads to Facebook using the AVC feature. Under which two actions must the administrator apply this restriction to an access policy? (Choose two.) https://www.cisco.com/c/en/us/products/collateral/security/web-security-appliance/datasheet-c78- 741272.html
A. onitor Facebook General
B. onitor Social Networking
C. onitor Facebook Photos and Videos
D. onitor Facebook Messages and Chat
E. onitor Facebook Application
عرض الإجابة
اجابة صحيحة: AC
السؤال #6
Which command displays this output?
A. grep
B. logconfig
C. rollovernow
D. tail
عرض الإجابة
اجابة صحيحة: B
السؤال #7
Which action is a valid default for the Global Access Policy in the Application Visibility Control engine on the Cisco WSA?
A. bandwidth limit
B. permit
C. restrict
D. monitor
عرض الإجابة
اجابة صحيحة: D
السؤال #8
Which two log types does the Cisco WSA provide to troubleshoot Cisco data security and external data loss prevention policies? (Choose two.)
A. upload data
B. data security
C. default proxyD
E. external data
عرض الإجابة
اجابة صحيحة: D
السؤال #9
A user browses to a company website that is categorized as Business and Industry and contains a Facebook post. Theuser cannot see the Facebook post because the category Social Networking is blocked.Which configuration allows the user to see the Facebook post?
A. Option A
B. Option B
C. Option C
D. Option D
عرض الإجابة
اجابة صحيحة: A
السؤال #10
Which response code in the access logs indicates that a transaction was blocked due to policy?
A. TCP_DENIED/407
B. TCP_DENIED/401
C. TCP_DENIED/403
D. TCP_DENIED/307
عرض الإجابة
اجابة صحيحة: A
السؤال #11
Which configuration mode does the Cisco WSA use to create an Active Directory realm for Kerberos authentication?
A. Forward
B. Connector
C. Transparent
D. Standard
عرض الإجابة
اجابة صحيحة: D
السؤال #12
When a Cisco WSA is installed with default settings, which port is assigned to the web proxy if the M1 port is used exclusively for management?
A. T1
B. P2
C. T2
D. P1
عرض الإجابة
اجابة صحيحة: C
السؤال #13
A network administrator noticed that all traffic that is redirected to the Cisco WSA from the Cisco ASA firewall cannot get to the Internet in a Transparent proxy environment using WCCP. Which troubleshooting action must be taken on the CLI to make sure that WCCP communication is not failing?
A. Disable WCCP to see if the WCCP service is causing the issue
B. Explicitly point the browser to the proxy
C. Ping the WCCP device
D. Check WCCP logs in debug mode
عرض الإجابة
اجابة صحيحة: D
السؤال #14
What is a benefit of integrating Cisco WSA with TrustSec in ISE?
A. The policy trace tool can be used to match access policies using specific SGT
B. Traffic of authenticated users who use 802
D. Users in a specific SGT can be denied access to certain social websites
عرض الإجابة
اجابة صحيحة: A
السؤال #15
What is needed to enable an HTTPS proxy?
A. self-signed server certificate
B. trusted third-party CA signed root certificate
C. self-signed CSR
D. self-signed root certificate
عرض الإجابة
اجابة صحيحة: C
السؤال #16
How does dynamic content analysis improve URL categorization? https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/118063-qanda-wsa- 00.html
A. t analyzes content based on cached destination content
B. t adds intelligence to detect categories by analyzing responses
C. t can be used as the only URL analysis method
D. t analyzes content of categorized URL to tune decisions and correct categorization errors
عرض الإجابة
اجابة صحيحة: D
السؤال #17
Which two features can be used with an upstream and downstream Cisco WSA web proxy to have the upstream WSA identify users by their client IP address? (Choose two.)
A. X-Forwarded-For
B. high availability
C. web cache
D. via
E. IP spoofing
عرض الإجابة
اجابة صحيحة: D
السؤال #18
Which two configuration options can be configured when invalid certificates are processed with the HTTPS proxy on WSA enabled? (Choose two.) https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/
A. llow
B. onitor
C. rop
D. lock
E. edirect
عرض الإجابة
اجابة صحيحة: BC
السؤال #19
What is needed to enable an HTTPS proxy? https://community.cisco.com/t5/web-security/cisco-wsa-https-proxy-certificate-issue/td-p/3019392
A. elf-signed server certificate
B. rusted third-party CA signed root certificate
C. elf-signed CSR
D. elf-signed root certificate
عرض الإجابة
اجابة صحيحة: C
السؤال #20
Which statement about configuring an identification profile for machine authentication is true?
A. Cloud Web Security Connector mode with an active directory enabled supports machine authentication
B. Identification profile machine ID is supported locally, but the Cisco WSA does not support machine ID authentication
C. Cloud Web Security with Kerberos enabled supports machine authentication
D. If an Active Directory realm is used, identification can be performed for an authenticated user or IP address but not for a machine ID
عرض الإجابة
اجابة صحيحة: C
السؤال #21
Which information in the HTTP request is used to determine if it is subject to the referrer exceptions feature in the Cisco WSA?
A. protocol
B. version
C. header
D. payload
عرض الإجابة
اجابة صحيحة: AC

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: