cisco 300-725 practice test

Securing the Web with Cisco Web Security Appliance (300-725 SWSA)

Last exam update: Nov 27 ,2025
Page 1 out of 4. Viewing questions 1-15 out of 60

Question 1

DRAG DROP
Drag and drop the Cisco WSA methods from the left onto the correct deployment modes on the
right.

Mark Question:
Answer:


Explanation:
You could use an explicit setting (browser config/PAC/WPAD) or transparent (WCCP/PBR) to point to
the first proxy and then the first proxy will route based on category to one of the two upstream
proxies based on your policy configuration.
Reference:
https://community.cisco.com/t5/web-security/route-to-wsa-based-on-destination/td-p/2491179

Discussions
0 / 1000

Question 2

What causes authentication failures on a Cisco WSA when LDAP is used for authentication?

  • A. when the passphrase contains only 5 characters
  • B. when the passphrase contains characters that are not 7-bit ASCI
  • C. when the passphrase contains one of following characters ‘@ # $ % ^’
  • D. when the passphrase contains 50 characters
Mark Question:
Answer:

B


Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_appendix_011001.html

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

Refer to the exhibit.

Which statement about the transaction log is true?

  • A. The log does not have a date and time
  • B. The proxy had the content and did not contact other servers
  • C. The transaction used TCP destination port 8187
  • D. The AnalizeSuspectTraffic policy group was applied to the transaction
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

Which two features can be used with an upstream and downstream Cisco WSA web proxy to have
the upstream WSA identify users by their client IP address? (Choose two.)

  • A. X-Forwarded-For
  • B. high availability
  • C. web cache
  • D. via
  • E. IP spoofing
Mark Question:
Answer:

AD


Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_0100.html

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 5

DRAG DROP
Drag and drop the properties from the left onto the correct advanced web proxy setting descriptions
on the right.

Mark Question:
Answer:


Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_0100.html

Discussions
0 / 1000

Question 6

Which two configuration options are available on a Cisco WSA within a decryption policy? (Choose
two.)

  • A. Pass Through
  • B. Warn
  • C. Decrypt
  • D. Allow
  • E. Block
Mark Question:
Answer:

AC


Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01011.html

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 7

Which information in the HTTP request is used to determine if it is subject to the referrer exceptions
feature in the Cisco WSA?

  • A. protocol
  • B. version
  • C. header
  • D. payload
Mark Question:
Answer:

C


Explanation:
Requests for embedded content usually include the address of the site from which the request
originated (this is known as the “referer” field in the request’s HTTP header). This header
information is used to determine categorization of the referred content.
Reference
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_01100.html

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

What is used to configure WSA as an explicit proxy?

  • A. IP Spoofing from router
  • B. Network settings from user browser
  • C. WCCP redirection from firewall
  • D. Auto redirection using PBR from switch
Mark Question:
Answer:

B


Reference:
https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/117940-qa-wsa-00.html

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

Which key is needed to pair a Cisco WSA and Cisco ScanCenter for CTA?

  • A. public SSH key that the Cisco WSA generates
  • B. public SSH key that Cisco ScanCenter generates
  • C. private SSH key that Cisco ScanCenter generates
  • D. private SSH key that the Cisco WSA generates
Mark Question:
Answer:

A


Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_010111.html

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

What is a benefit of integrating Cisco Cognitive Threat Analytics with a Cisco WSA?

  • A. It adds additional information to the Cisco WSA reports
  • B. It adds additional malware protection to the Cisco WSA
  • C. It provides the ability to use artificial intelligence to block viruses
  • D. It reduces time to identify threats in the network
Mark Question:
Answer:

B


Reference:
https://www.ironportstore.com/datasheets/data_sheet_c78-729630.pdf

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Which method is used by AMP against zero-day and targeted file-based attacks?

  • A. analyzing behavior of all files that are not yet known to the reputation service
  • B. periodically evaluating emerging threats as new information becomes available
  • C. implementing security group tags
  • D. obtaining the reputation of known files
Mark Question:
Answer:

D


Reference:
https://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/advanced-malware-protection/solution-overview-c22-734228.html

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

Which behavior is seen while the policy trace tool is used to troubleshoot a Cisco WSA?

  • A. External DLP polices are evaluated by the tool
  • B. A real client request is processed and an EUN page is displayed
  • C. SOCKS policies are evaluated by the tool
  • D. The web proxy does not record the policy trace test requests in the access log when the tool is in use
Mark Question:
Answer:

D


Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_appendix_011001.html#con_1415277

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

What are all of the available options for configuring an exception to blocking for referred content?

  • A. all embedded/referred and all embedded/referred except
  • B. selected embedded/referred except, all embedded/referred, and selected embedded/referred
  • C. selected embedded/referred and all embedded/referred except
  • D. all embedded/referred, selected embedded/referred, and all embedded/referred except
Mark Question:
Answer:

D


Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01001.html(procedure)

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Which statement about the SOCKS proxy is true?

  • A. SOCKS is a general purpose proxy
  • B. SOCKS operates on TCP port 80, 443, and 8334
  • C. SOCKS is used only for traffic that is redirected through a firewall
  • D. SOCKS is used for UDP traffic only
Mark Question:
Answer:

A


Reference:
http://www.jguru.com/faq/view.jsp?EID=227532

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

Which two parameters are mandatory to control access to websites with proxy authentication on a
Cisco WSA? (Choose two.)

  • A. External Authentication
  • B. Identity Enabled Authentication
  • C. Transparent User Identification
  • D. Credential Encryption
  • E. Authentication Realm
Mark Question:
Answer:

DE


Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_appendix_010111.html

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000
To page 2