cisco 300-725 practice test

Securing the Web with Cisco Web Security Appliance (SWSA)


Question 1

DRAG DROP
Drag and drop the properties from the left onto the correct advanced web proxy setting descriptions on the right.
Select and Place:

Answer:

Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-
0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_0100.html

Discussions

Question 2

Which statement about identification profile default settings on the Cisco WSA is true?

  • A. Identification profiles do not require authentication
  • B. Guest identification profile should be processed first
  • C. Identification profiles can include only one user group
  • D. AsyncOS processes identification profiles alphabetically
Answer:

A

Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-
0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_011001.html#con_1415970

Discussions

Question 3

A network administrator noticed that all traffic that is redirected to the Cisco WSA from the Cisco ASA firewall cannot get to
the Internet in a Transparent proxy environment using WCCP.
Which troubleshooting action must be taken on the CLI to make sure that WCCP communication is not failing?

  • A. Disable WCCP to see if the WCCP service is causing the issue
  • B. Explicitly point the browser to the proxy
  • C. Ping the WCCP device
  • D. Check WCCP logs in debug mode
Answer:

D

Discussions

Question 4

What is used to configure WSA as an explicit proxy?

  • A. IP Spoofing from router
  • B. Network settings from user browser
  • C. WCCP redirection from firewall
  • D. Auto redirection using PBR from switch
Answer:

B

Explanation:
Reference: https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/117940-qa-wsa-00.html

Discussions

Question 5

What is the function of a PAC file on a Cisco WSA?

  • A. The file allows redirection of web traffic to a specific proxy server
  • B. The file is mandatory for a transparent proxy to redirect user traffic
  • C. The file provides instructions about which URL categories are permitted
  • D. The file is mandatory for an explicit proxy to forward user traffic
Answer:

A

Explanation:
Reference: https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wlan-security/116052-config-webauth-proxy-
00.html

Discussions

Question 6


Refer to the exhibit. Which command displays this output?

  • A. grep
  • B. logconfig
  • C. rollovernow
  • D. tail
Answer:

A

Explanation:
Reference: https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/117938-configure-wsa-00.html

Discussions

Question 7

Which statement about the SOCKS proxy is true?

  • A. SOCKS is a general purpose proxy
  • B. SOCKS operates on TCP port 80, 443, and 8334
  • C. SOCKS is used only for traffic that is redirected through a firewall
  • D. SOCKS is used for UDP traffic only
Answer:

A

Explanation:
Reference: http://www.jguru.com/faq/view.jsp?EID=227532

Discussions

Question 8

Which two modes of operation does the Cisco WSA provide? (Choose two.)

  • A. connector
  • B. proxy
  • C. transparent
  • D. standard
  • E. explicit
Answer:

C E

Explanation:
Reference: https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Aug2013/CVD-
WebSecurityUsingCiscoWSADesignGuide-AUG13.pdf

Discussions

Question 9

DRAG DROP
Drag and drop the actions from the left into the correct order on the right in which they occur as an HTTPS session passes
through the Cisco WSA.
Select and Place:

Answer:

Discussions

Question 10

Which information in the HTTP request is used to determine if it is subject to the referrer exceptions feature in the Cisco
WSA?

  • A. protocol
  • B. version
  • C. header
  • D. payload
Answer:

C

Explanation:
Requests for embedded content usually include the address of the site from which the request originated (this is known as
the referer field in the requests HTTP header). This header information is used to determine categorization of the referred
content.
Reference https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-
0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_01100.html

Discussions
To page 2