DRAG DROP
Drag and drop the properties from the left onto the correct advanced web proxy setting descriptions on the right.
Select and Place:
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-
0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_0100.html
Which statement about identification profile default settings on the Cisco WSA is true?
A
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-
0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_011001.html#con_1415970
A network administrator noticed that all traffic that is redirected to the Cisco WSA from the Cisco ASA firewall cannot get to
the Internet in a Transparent proxy environment using WCCP.
Which troubleshooting action must be taken on the CLI to make sure that WCCP communication is not failing?
D
What is used to configure WSA as an explicit proxy?
B
Explanation:
Reference: https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/117940-qa-wsa-00.html
What is the function of a PAC file on a Cisco WSA?
A
Explanation:
Reference: https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wlan-security/116052-config-webauth-proxy-
00.html
Refer to the exhibit. Which command displays this output?
A
Explanation:
Reference: https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/117938-configure-wsa-00.html
Which statement about the SOCKS proxy is true?
A
Explanation:
Reference: http://www.jguru.com/faq/view.jsp?EID=227532
Which two modes of operation does the Cisco WSA provide? (Choose two.)
C E
Explanation:
Reference: https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Aug2013/CVD-
WebSecurityUsingCiscoWSADesignGuide-AUG13.pdf
DRAG DROP
Drag and drop the actions from the left into the correct order on the right in which they occur as an HTTPS session passes
through the Cisco WSA.
Select and Place:
Which information in the HTTP request is used to determine if it is subject to the referrer exceptions feature in the Cisco
WSA?
C
Explanation:
Requests for embedded content usually include the address of the site from which the request originated (this is known as
the referer field in the requests HTTP header). This header information is used to determine categorization of the referred
content.
Reference https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-
0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_01100.html