cisco 300-725 practice test

securing the web with cisco web security appliance (300-725 swsa)

Last exam update: Sep 09 ,2024
Page 1 out of 3. Viewing questions 1-10 out of 23

Question 1

Which two log types does the Cisco WSA provide to troubleshoot Cisco data security and external data loss prevention policies? (Choose two.)

  • A. upload data
  • B. data security
  • C. default proxy
  • D. data access
  • E. external data
Answer:

ce


Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_010011.html

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 2

How does dynamic content analysis improve URL categorization?

  • A. It analyzes content based on cached destination content
  • B. It adds intelligence to detect categories by analyzing responses
  • C. It can be used as the only URL analysis method
  • D. It analyzes content of categorized URL to tune decisions and correct categorization errors
Answer:

d


Reference:
https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/118063-qanda-wsa-00.html

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

Which response code in the access logs indicates that a transaction was blocked due to policy?

  • A. TCP_DENIED/407
  • B. TCP_DENIED/401
  • C. TCP_DENIED/403
  • D. TCP_DENIED/307
Answer:

a


Reference:
https://docuri.com/download/instructions_59a8d562f581719e12ad43fe_pdf

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

What causes authentication failures on a Cisco WSA when LDAP is used for authentication?

  • A. when the passphrase contains only 5 characters
  • B. when the passphrase contains characters that are not 7-bit ASCI
  • C. when the passphrase contains one of following characters "@ # $ % ^'
  • D. when the passphrase contains 50 characters
Answer:

b


Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_appendix_011001.html

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5


Refer to the exhibit. Which command displays this output?

  • A. grep
  • B. logconfig
  • C. rollovernow
  • D. tail
Answer:

a


Reference:
https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/117938-configure-wsa-00.html

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6


Refer to the exhibit. Which statement about the transaction log is true?

  • A. The log does not have a date and time
  • B. The proxy had the content and did not contact other servers
  • C. The transaction used TCP destination port 8187
  • D. The AnalizeSuspectTraffic policy group was applied to the transaction
Answer:

d

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

What is needed to enable an HTTPS proxy?

  • A. self-signed server certificate
  • B. trusted third-party CA signed root certificate
  • C. self-signed CSR
  • D. self-signed root certificate
Answer:

c


Reference:
https://community.cisco.com/t5/web-security/cisco-wsa-https-proxy-certificate-issue/td-p/3019392

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

What must be configured to require users to click through an acceptance page before they are allowed to go to the Internet through the Cisco WSA?

  • A. Enable End-User Acknowledgement Page and set to Required in Identification Profiles
  • B. Enable End -User URL Filtering Warning Page and set to Required in Identification Profiles
  • C. Enable End-User Acknowledgement Page and set to Required in Access Policies
  • D. Enable End-User URL Filtering Warning Page and set to Required in Access Policies
Answer:

c


Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_010100.html

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

Which two parameters are mandatory to control access to websites with proxy authentication on a Cisco WSA? (Choose two.)

  • A. External Authentication
  • B. Identity Enabled Authentication
  • C. Transparent User Identification
  • D. Credential Encryption
  • E. Authentication Realm
Answer:

de


Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_appendix_010111.html

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 10

DRAG DROP Drag and drop the Cisco WSA access policy elements from the left into the order in which they are processed on the right.
Select and Place:

Answer:

Discussions
0 / 1000
To page 2