Question 6 of 60

Which two configuration options are available on a Cisco WSA within a decryption policy? (Choose two.)
Answer

Suggested Answer

The suggested answer is A, C.

Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01011.html
Question 7 of 60

Which information in the HTTP request is used to determine if it is subject to the referrer exceptions feature in the Cisco WSA?
Answer

Suggested Answer

The suggested answer is C.

Requests for embedded content usually include the address of the site from which the request originated (this is known as the "referer" field in the request's HTTP header). This header information is used to determine categorization of the referred content.

Reference -
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_01100.html
Question 8 of 60

What is used to configure WSA as an explicit proxy?
Answer

Suggested Answer

The suggested answer is B.

Reference:
https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/117940-qa-wsa-00.html
Question 9 of 60

Which key is needed to pair a Cisco WSA and Cisco ScanCenter for CTA?
Answer

Suggested Answer

The suggested answer is A.

Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_010111.html
Community Votes1 vote
ASuggested
100%
Question 10 of 60

What is a benefit of integrating Cisco Cognitive Threat Analytics with a Cisco WSA?
Answer

Suggested Answer

The suggested answer is B.

Reference:
https://www.ironportstore.com/datasheets/data_sheet_c78-729630.pdf