cisco 300-725 practice test

Exam Title: Securing the Web with Cisco Web Security Appliance (300-725 SWSA)

Last update: Dec 26 ,2025
Question 1

Which method is used by AMP against zero-day and targeted file-based attacks?

  • A. analyzing behavior of all files that are not yet known to the reputation service
  • B. periodically evaluating emerging threats as new information becomes available
  • C. implementing security group tags
  • D. obtaining the reputation of known files
Answer:

D


Reference:
https://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/advanced-malware-protection/solution-overview-c22-734228.html

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 2

Which behavior is seen while the policy trace tool is used to troubleshoot a Cisco WSA?

  • A. External DLP polices are evaluated by the tool
  • B. A real client request is processed and an EUN page is displayed
  • C. SOCKS policies are evaluated by the tool
  • D. The web proxy does not record the policy trace test requests in the access log when the tool is in use
Answer:

D


Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_appendix_011001.html#con_1415277

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 3

What are all of the available options for configuring an exception to blocking for referred content?

  • A. all embedded/referred and all embedded/referred except
  • B. selected embedded/referred except, all embedded/referred, and selected embedded/referred
  • C. selected embedded/referred and all embedded/referred except
  • D. all embedded/referred, selected embedded/referred, and all embedded/referred except
Answer:

D


Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01001.html(procedure)

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 4

Which statement about the SOCKS proxy is true?

  • A. SOCKS is a general purpose proxy
  • B. SOCKS operates on TCP port 80, 443, and 8334
  • C. SOCKS is used only for traffic that is redirected through a firewall
  • D. SOCKS is used for UDP traffic only
Answer:

A


Reference:
http://www.jguru.com/faq/view.jsp?EID=227532

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 5

Which two parameters are mandatory to control access to websites with proxy authentication on a
Cisco WSA? (Choose two.)

  • A. External Authentication
  • B. Identity Enabled Authentication
  • C. Transparent User Identification
  • D. Credential Encryption
  • E. Authentication Realm
Answer:

DE


Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_appendix_010111.html

vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Question 6

What is a valid predefined time range when configuring a Web Tracking query?

  • A. year
  • B. minute
  • C. hour
  • D. month
Answer:

B


Explanation:
Web tracking query uses minute as a predefined time range to track web related queries.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 7

When a Cisco WSA is installed with default settings, which port is assigned to the web proxy if the
M1 port is used exclusively for management?

  • A. T1
  • B. P2
  • C. T2
  • D. P1
Answer:

D


Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-5/user_guide/b_WSA_UserGuide_11_5_1/b_WSA_UserGuide_11_5_1_chapter_01.html

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 8

Which configuration option is suitable for explicit mode deployment?

  • A. PAC
  • B. WCCP
  • C. ITD
  • D. PBR
Answer:

A


Explanation:
In explicit-mode deployment, users will point the proxy setting to WSA. This can be done by pointing
directly to WSA or via a PAC (Proxy Auto-Config) file.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 9

By default, which two pieces of information does the Cisco WSA access log contain? (Choose two.)

  • A. HTTP Request Code
  • B. Content Type
  • C. Client IP Address
  • D. User Agent
  • E. Transaction ID
Answer:

AC

vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Question 10

Which two sources provide data to Cisco Advanced Web Security Reporting to create dashboards?
(Choose
two.)

  • A. Cisco WSA devices
  • B. Cisco ISE
  • C. Cisco ASAv
  • D. Cisco Security MARS
  • E. Cisco Cloud Web Security gateways
Answer:

AE


Reference:
https://www.cisco.com/c/dam/en/us/td/docs/security/wsa/Advanced_Reporting/
WSA_Advanced_Reporting_6/Advanced_Web_Security_Reporting_6_1.pdf

vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Page 1 out of 5
Viewing questions 1-10 out of 60
Go To
page 2