Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

CCNP Security 300-725 SWSA Dumps

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11
At a glance
Powered by AI
The document discusses exam questions and answers related to Cisco's 300-725 exam on securing the web with Cisco Web Security Appliance (WSA). It provides sample questions on WSA configuration and features.

Cisco WSA can be used for web proxy and authentication. Features like X-Forwarded-For and via can be used to identify users by client IP address. Cisco WSA also supports malware protection when integrated with Cisco Cognitive Threat Analytics.

Within a decryption policy on Cisco WSA, the available configuration options are Pass Through and Decrypt.

300-725 Dumps

Securing the Web with Cisco


Web Security Appliance
(SWSA)

https://www.passcert.com/300-725.html
Download Passcert valid 300-725 exam dumps to pass your 300-725 exam successfully

Question 1
What causes authentication failures on a Cisco WSA when LDAP is used for authentication?
A. when the passphrase contains only 5 characters
B. when the passphrase contains characters that are not 7-bit ASCI
C. when the passphrase contains one of following characters ‘@ # $ % ^’
D. when the passphrase contains 50 characters
Answer: B

2
Download Passcert valid 300-725 exam dumps to pass your 300-725 exam successfully

Question 2
Which two features can be used with an upstream and downstream Cisco WSA web proxy to
have the upstream WSA identify users by their client IP address? (Choose two.)
A. X-Forwarded-For
B. high availability
C. web cache
D. via
E. IP spoofing
Answer: AD

3
Download Passcert valid 300-725 exam dumps to pass your 300-725 exam successfully

Question 3
Which two configuration options are available on a Cisco WSA within a decryption policy?
(Choose two.)
A. Pass Through
B. Warn
C. Decrypt
D. Allow
E. Block
Answer: AC

4
Download Passcert valid 300-725 exam dumps to pass your 300-725 exam successfully

Question 4
Which information in the HTTP request is used to determine if it is subject to the
referrer exceptions feature in the Cisco WSA?
A. protocol
B. version
C. header
D. payload
Answer: C

5
Download Passcert valid 300-725 exam dumps to pass your 300-725 exam successfully

Question 5
What is used to configure WSA as an explicit proxy?
A. IP Spoofing from router
B. Network settings from user browser
C. WCCP redirection from firewall
D. Auto redirection using PBR from switch
Answer: B

6
Download Passcert valid 300-725 exam dumps to pass your 300-725 exam successfully

Question 6
Which key is needed to pair a Cisco WSA and Cisco ScanCenter for CTA?
A. public SSH key that the Cisco WSA generates
B. public SSH key that Cisco ScanCenter generates
C. private SSH key that Cisco ScanCenter generates
D. private SSH key that the Cisco WSA generates
Answer: A

7
Download Passcert valid 300-725 exam dumps to pass your 300-725 exam successfully

Question 7
What is a benefit of integrating Cisco Cognitive Threat Analytics with a Cisco WSA?
A. It adds additional information to the Cisco WSA reports
B. It adds additional malware protection to the Cisco WSA
C. It provides the ability to use artificial intelligence to block viruses
D. It reduces time to identify threats in the network
Answer: B

8
Download Passcert valid 300-725 exam dumps to pass your 300-725 exam successfully

Question 8
Which method is used by AMP against zero-day and targeted file-based attacks?
A. analyzing behavior of all files that are not yet known to the reputation service
B. periodically evaluating emerging threats as new information becomes available
C. implementing security group tags
D. obtaining the reputation of known files
Answer: D

9
Download Passcert valid 300-725 exam dumps to pass your 300-725 exam successfully

Question 9
Which behavior is seen while the policy trace tool is used to troubleshoot a Cisco
WSA?
A. External DLP polices are evaluated by the tool
B. A real client request is processed and an EUN page is displayed
C. SOCKS policies are evaluated by the tool
D. The web proxy does not record the policy trace test requests in the access log when
the tool is in use
Answer: D

10
What To Get?
ü 100% Real Exam Questions
ü One Year Free Update
ü Money Back Guarantee
ü Free Software
ü Free Demo Download

11

You might also like