Pass the Cisco CCNP Security 300-725 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which type of FTP proxy does the Cisco WSA support?

Options:

A.

non-native FTP


B.

FTP over UDP tunneling


C.

FTP over HTTP


D.

hybrid FTP


Expert Solution
Questions # 2:

What is the default action when a new custom category is created and added to an access policy?

Options:

A.

monitor


B.

allow


C.

block


D.

decrypt


Expert Solution
Questions # 3:

Which two parameters are mandatory to control access to websites with proxy authentication on a Cisco WSA? (Choose two.)

Options:

A.

External Authentication


B.

Identity Enabled Authentication


C.

Transparent User Identification


D.

Credential Encryption


E.

Authentication Realm


Expert Solution
Questions # 4:

Drag and drop the properties from the left onto the correct advanced web proxy setting descriptions on the right.

Question # 4


Expert Solution
Questions # 5:

Which statement about configuring an identification profile for machine authentication is true?

Options:

A.

Cloud Web Security Connector mode with an active directory enabled supports machine authentication


B.

Identification profile machine ID is supported locally, but the Cisco WSA does not support machine ID authentication


C.

Cloud Web Security with Kerberos enabled supports machine authentication


D.

If an Active Directory realm is used, identification can be performed for an authenticated user or IP address but not for a machine ID


Expert Solution
Questions # 6:

What is a benefit of integrating Cisco Cognitive Threat Analytics with a Cisco WSA?

Options:

A.

It adds additional information to the Cisco WSA reports


B.

It adds additional malware protection to the Cisco WSA


C.

It provides the ability to use artificial intelligence to block viruses


D.

It reduces time to identify threats in the network


Expert Solution
Questions # 7:

Refer to the exhibit.

Question # 7

Which statement about the transaction log is true?

Options:

A.

The log does not have a date and time


B.

The proxy had the content and did not contact other servers


C.

The transaction used TCP destination port 8187


D.

The AnalizeSuspectTraffic policy group was applied to the transaction


Expert Solution
Questions # 8:

By default, which two pieces of information does the Cisco WSA access log contain? (Choose two.)

Options:

A.

HTTP Request Code


B.

Content Type


C.

Client IP Address


D.

User Agent


E.

Transaction ID


Expert Solution
Questions # 9:

Which IP address and port are used by default to run the system setup wizard?

Options:

A.

http://192.168.42.42:80


B.

https://192.168.42.42:8080 C. https://192.168.42.10:8443 D. http://192.168.43.42:8080


Expert Solution
Questions # 10:

What is a benefit of integrating Cisco WSA with TrustSec in ISE?

Options:

A.

The policy trace tool can be used to match access policies using specific SGT


B.

Traffic of authenticated users who use 802.1x can be tagged with SGT to identification profiles in a Cisco WSA


C.

ISE can block authentication for users who generate multiple sessions using suspect TCP ports


D.

Users in a specific SGT can be denied access to certain social websites.


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions