Which certificate format does a Cisco WSA need when HTTPS proxy is configured?
c
Reference:
https://community.cisco.com/t5/security-documents/wsa-training-series-how-to-configure-the-https-proxy-on-the/ta-p/3148673
What is the primary benefit of using Cisco Advanced Web Security Reporting?
b
Reference:
https://www.cisco.com/c/en/us/products/collateral/security/web-security-appliance/datasheet_c78-729104.html
How does dynamic content analysis improve URL categorization?
d
Reference:
https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/118063-qanda-wsa-00.html
What is a benefit of integrating Cisco Cognitive Threat Analytics with a Cisco WSA?
b
Reference:
https://www.ironportstore.com/datasheets/data_sheet_c78-729630.pdf
When an access policy is created, what is the default option for the Application Settings?
b
Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01111.html
Refer to the exhibit. Which statement about the transaction log is true?
d
Which method is used by AMP against zero-day and targeted file-based attacks?
d
Reference:
https://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/advanced-malware-protection/solution-overview-c22-734228.html
What must be configured first when creating an access policy that matches the Active Directory group?
c
Reference:
https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/118005-configure-ntlm-00.html
DRAG DROP Drag and drop the actions from the left into the correct order on the right in which they occur as an HTTPS session passes through the Cisco WSA.
Select and Place:
An administrator wants to restrict file uploads to Facebook using the AVC feature.
Under which two actions must the administrator apply this restriction to an access policy? (Choose two.)
ac
Reference:
https://www.cisco.com/c/en/us/products/collateral/security/web-security-appliance/datasheet-c78-741272.html