What causes authentication failures on a Cisco WSA when LDAP is used for authentication?
A. when the passphrase contains only 5 characters
B. when the passphrase contains characters that are not 7-bit ASCI
C. when the passphrase contains one of following characters `@ # $ % ^'
D. when the passphrase contains 50 characters
Which two configuration options are available on a Cisco WSA within a decryption policy? (Choose two.)
A. Pass Through
B. Warn
C. Decrypt
D. Allow
E. Block
Which behavior is seen while the policy trace tool is used to troubleshoot a Cisco WSA?
A. External DLP polices are evaluated by the tool
B. A real client request is processed and an EUN page is displayed
C. SOCKS policies are evaluated by the tool
D. The web proxy does not record the policy trace test requests in the access log when the tool is in use
By default, which two pieces of information does the Cisco WSA access log contain? (Choose two.)
A. HTTP Request Code
B. Content Type
C. Client IP Address
D. User Agent
E. Transaction ID
How does the Cisco WSA choose which scanning engine verdict to use when there is more than one verdict?
A. based on the least restrictive verdict
B. based on the most restrictive verdict
C. based on the first verdict returned
D. based on the last verdict returned
Which response code in the access logs indicates that a transaction was blocked due to policy?
A. TCP_DENIED/407
B. TCP_DENIED/401
C. TCP_DENIED/403
D. TCP_DENIED/307
Which statement about identification profile default settings on the Cisco WSA is true?
A. Identification profiles do not require authentication
B. Guest identification profile should be processed first
C. Identification profiles can include only one user group
D. AsyncOS processes identification profiles alphabetically
An administrator wants to restrict file uploads to Facebook using the AVC feature.
Under which two actions must the administrator apply this restriction to an access policy? (Choose two.)
A. Monitor Facebook General
B. Monitor Social Networking
C. Monitor Facebook Photos and Videos
D. Monitor Facebook Messages and Chat
E. Monitor Facebook Application
Which two caching modes are available in the Cisco WSA? (Choose two.)
A. active cache
B. all cache
C. aggressive cache
D. safe cache
E. no cache
What is the purpose of using AMP file analysis on a Cisco WSA to continuously evaluate emerging threats?
A. to take appropriate action on new files that enter the network
B. to remove files from quarantine by stopping their retention period
C. to notify you of files that are determined to be threats after they have entered your network
D. to send all files downloaded through the Cisco WSA to the AMP cloud