Question 6 of 60
Which two configuration options are available on a Cisco WSA within a decryption policy? (Choose two.)
    Correct Answer: A, C

Question 7 of 60
Which information in the HTTP request is used to determine if it is subject to the referrer exceptions feature in the Cisco WSA?
    Correct Answer: C

Question 8 of 60
What is used to configure WSA as an explicit proxy?
    Correct Answer: B

Question 9 of 60
Which key is needed to pair a Cisco WSA and Cisco ScanCenter for CTA?
    Correct Answer: A

Question 10 of 60
What is a benefit of integrating Cisco Cognitive Threat Analytics with a Cisco WSA?
    Correct Answer: B