DRAG DROP
Drag and drop the Cisco WSA methods from the left onto the correct deployment modes on the
right.

Explanation:
You could use an explicit setting (browser config/PAC/WPAD) or transparent (WCCP/PBR) to point to
the first proxy and then the first proxy will route based on category to one of the two upstream
proxies based on your policy configuration.
Reference:
https://community.cisco.com/t5/web-security/route-to-wsa-based-on-destination/td-p/2491179
What causes authentication failures on a Cisco WSA when LDAP is used for authentication?
B
Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_appendix_011001.html
Refer to the exhibit.
Which statement about the transaction log is true?
D
Which two features can be used with an upstream and downstream Cisco WSA web proxy to have
the upstream WSA identify users by their client IP address? (Choose two.)
AD
Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_0100.html
DRAG DROP
Drag and drop the properties from the left onto the correct advanced web proxy setting descriptions
on the right.

Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_0100.html
Which two configuration options are available on a Cisco WSA within a decryption policy? (Choose
two.)
AC
Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01011.html
Which information in the HTTP request is used to determine if it is subject to the referrer exceptions
feature in the Cisco WSA?
C
Explanation:
Requests for embedded content usually include the address of the site from which the request
originated (this is known as the “referer” field in the request’s HTTP header). This header
information is used to determine categorization of the referred content.
Reference
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_01100.html
What is used to configure WSA as an explicit proxy?
B
Reference:
https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/117940-qa-wsa-00.html
Which key is needed to pair a Cisco WSA and Cisco ScanCenter for CTA?
A
Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_010111.html
What is a benefit of integrating Cisco Cognitive Threat Analytics with a Cisco WSA?
B
Reference:
https://www.ironportstore.com/datasheets/data_sheet_c78-729630.pdf
Which method is used by AMP against zero-day and targeted file-based attacks?
D
Reference:
https://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/advanced-malware-protection/solution-overview-c22-734228.html
Which behavior is seen while the policy trace tool is used to troubleshoot a Cisco WSA?
D
Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_appendix_011001.html#con_1415277
What are all of the available options for configuring an exception to blocking for referred content?
D
Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01001.html(procedure)
Which statement about the SOCKS proxy is true?
A
Reference:
http://www.jguru.com/faq/view.jsp?EID=227532
Which two parameters are mandatory to control access to websites with proxy authentication on a
Cisco WSA? (Choose two.)
DE
Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_appendix_010111.html