Which method is used by AMP against zero-day and targeted file-based attacks?
D
Reference:
https://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/advanced-malware-protection/solution-overview-c22-734228.html
Which behavior is seen while the policy trace tool is used to troubleshoot a Cisco WSA?
D
Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_appendix_011001.html#con_1415277
What are all of the available options for configuring an exception to blocking for referred content?
D
Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01001.html(procedure)
Which statement about the SOCKS proxy is true?
A
Reference:
http://www.jguru.com/faq/view.jsp?EID=227532
Which two parameters are mandatory to control access to websites with proxy authentication on a
Cisco WSA? (Choose two.)
DE
Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_appendix_010111.html
What is a valid predefined time range when configuring a Web Tracking query?
B
Explanation:
Web tracking query uses minute as a predefined time range to track web related queries.
When a Cisco WSA is installed with default settings, which port is assigned to the web proxy if the
M1 port is used exclusively for management?
D
Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-5/user_guide/b_WSA_UserGuide_11_5_1/b_WSA_UserGuide_11_5_1_chapter_01.html
Which configuration option is suitable for explicit mode deployment?
A
Explanation:
In explicit-mode deployment, users will point the proxy setting to WSA. This can be done by pointing
directly to WSA or via a PAC (Proxy Auto-Config) file.
By default, which two pieces of information does the Cisco WSA access log contain? (Choose two.)
AC
Which two sources provide data to Cisco Advanced Web Security Reporting to create dashboards?
(Choose
two.)
AE
Reference:
https://www.cisco.com/c/dam/en/us/td/docs/security/wsa/Advanced_Reporting/
WSA_Advanced_Reporting_6/Advanced_Web_Security_Reporting_6_1.pdf