IT認証試験問題集
毎月、GOWUKAKUは1500人以上の受験者が試験準備を助けて、試験に合格するために受験者にご協力します
 ホームページ / 300-725 問題集  / 300-725 問題練習

Cisco 300-725 問題練習

Securing the Web with Cisco Web Security Appliance (SWSA) 試験

最新更新時間: 2024/04/10,合計60問。

【2024桜まつりキャンペーン】:300-725 最新真題を買う時、日本語版と英語版両方を同時に獲得できます。

実際の問題集を練習し、試験のポイントを了解し、テストに申し込むするかどうかを決めることができます。

さらに試験準備時間の35%を節約するには、300-725 問題集を使用してください。

 / 1

Question No : 1
Which two parameters are mandatory to control access to websites with proxy authentication on a Cisco WSA? (Choose two.)

正解:
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_appendix_010111.html

Question No : 2
Which statement about the SOCKS proxy is true?

正解:
Explanation:
Reference: http://www.jguru.com/faq/view.jsp?EID=227532

Question No : 3
What are all of the available options for configuring an exception to blocking for referred content?

正解:
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01001.html (procedure)

Question No : 4
Which behavior is seen while the policy trace tool is used to troubleshoot a Cisco WSA?

正解:
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_appendix_011001.html#con_1415277

Question No : 5
Which method is used by AMP against zero-day and targeted file-based attacks?

正解:
Explanation:
Reference: https://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/advanced-malware­protection/solution-overview-c22-734228.html

Question No : 6
What is a benefit of integrating Cisco Cognitive Threat Analytics with a Cisco WSA?

正解:
Explanation:
Reference: https://www.ironportstore.com/datasheets/data_sheet_c78-729630.pdf

Question No : 7
Which key is needed to pair a Cisco WSA and Cisco ScanCenter for CTA?

正解:
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_010111.html

Question No : 8
What is used to configure WSA as an explicit proxy?

正解:
Explanation:
Reference: https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/117940-qa-wsa­00.html

Question No : 9
Which information in the HTTP request is used to determine if it is subject to the referrer exceptions feature in the Cisco WSA?

正解:
Explanation:
Requests for embedded content usually include the address of the site from which the request originated (this is known as the “referer” field in the request’s HTTP header). This header information is used to determine categorization of the referred content. Reference https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_01100.html

Question No : 10
Which two configuration options are available on a Cisco WSA within a decryption policy? (Choose two.)

正解:
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01011.html

Question No : 11
DRAG DROP
Drag and drop the properties from the left onto the correct advanced web proxy setting descriptions on the right.



正解:


Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_0100.html

Question No : 12
Which two features can be used with an upstream and downstream Cisco WSA web proxy to have the upstream WSA identify users by their client IP address? (Choose two.)

正解:
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_0100.html

Question No : 13
Refer to the exhibit.



Which statement about the transaction log is true?

正解:
Explanation:

Question No : 14
What causes authentication failures on a Cisco WSA when LDAP is used for authentication?

正解:
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_appendix_011001.html

Question No : 15
DRAG DROP
Drag and drop the Cisco WSA methods from the left onto the correct deployment modes on the right.



正解:


Explanation:
You could use an explicit setting (browser config/PAC/WPAD) or transparent (WCCP/PBR) to point to the first proxy and then the first proxy will route based on category to one of the two upstream proxies based on your policy configuration. Reference: https://community.cisco.com/t5/web-security/route-to-wsa-based-on-destination/td-p/2491179

 / 1