300-725 Dumps
300-725 Braindumps
300-725 Real Questions
300-725 Practice Test
300-725 dumps free
Securing the Web with Cisco Web Security Appliance
http://killexams.com/pass4sure/exam-detail/300-725
It analyzes content based on cached destination content
It adds intelligence to detect categories by analyzing responses
It can be used as the only URL analysis method
It analyzes content of categorized URL to tune decisions and correct categorization errors
Reference: https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/118063-qanda-wsa-00.html
What is needed to enable an HTTPS proxy?
self-signed server certificate
trusted third-party CA signed root certificate
self-signed CSR
self-signed root certificate
Reference: https://community.cisco.com/t5/web-security/cisco-wsa-https-proxy-certificate-issue/td-p/3019392
Which two configuration options can be configured when invalid certificates are processed with the HTTPS proxy on WSA enabled? (Choose two.)
allow
monitor
drop
block
redirect
to take appropriate action on new files that enter the network
to remove files from quarantine by stopping their retention period
to notify you of files that are determined to be threats after they have entered your network
to send all files downloaded through the Cisco WSA to the AMP cloud
server
client
root
wildcard
Which two log types does the Cisco WSA provide to troubleshoot Cisco data security and external data loss prevention policies? (Choose two.)
upload data
data security
default proxyD. data access
E. external data
8080
8443
8021
3128
Reference: https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Aug2013/CVD-WebSecurityUsingCiscoWSADesignGuide-AUG13.pdf (16)
What is a benefit of integrating Cisco WSA with TrustSec in ISE?
The policy trace tool can be used to match access policies using specific SGT
Traffic of authenticated users who use 802.1x can be tagged with SGT to identification profiles in a Cisco WSAC. ISE can block authentication for users who generate multiple sessions using suspect TCP ports
D. Users in a specific SGT can be denied access to certain social websites.
Use Global Policy Applications Settings
Define the Applications Custom Setting
Set all applications to Block
Set all applications to Monitor
ability to see the malicious activity of a user
L4TM report with client-malware risk
centralized and granular reporting
access to a day report with historical data
For More exams visit https://killexams.com/vendors-exam-list
Kill your exam at First Attempt....Guaranteed!