300-725 Practice Questions
70 real 300-725 exam questions with expert-verified answers and explanations. Page 1 of 2.
- Question #1Cisco WSA Policies
Which response code in the access logs indicates that a transaction was blocked due to policy?
Cisco WSAAccess LogsPolicy EnforcementHTTP Status Codes - Question #2Data Loss Prevention
Which two features on the Cisco WSA help prevent outbound data loss for HTTP or FTP traffic? (Choose two.)
Cisco WSAData Loss PreventionData Security FiltersDLP Integration - Question #3Cisco WSA Authentication
Which configuration mode does the Cisco WSA use to create an Active Directory realm for Kerberos authentication?
Cisco WSAKerberos authenticationActive DirectoryAuthentication realm - Question #4Differentiated Traffic Access Policies and Identification Profiles
Which statement about identification profile default settings on the Cisco WSA is true?
Cisco WSAIdentification ProfilesAuthenticationPolicy Logic - Question #5Access Policies
Which action is a valid default for the Global Access Policy in the Application Visibility Control engine on the Cisco WSA?
Cisco WSAApplication Visibility Control (AVC)Global Access PolicyDefault actions - Question #6WCCP
A network administrator noticed that all traffic that is redirected to the Cisco WSA from the Cisco ASA firewall cannot get to the Internet in a Transparent proxy environment using...
WCCPTroubleshootingTransparent ProxyCLI - Question #7Acceptable Use Control
What must be configured to require users to click through an acceptance page before they are allowed to go to the Internet through the Cisco WSA?
Cisco WSAAcceptance PageAccess PoliciesEnd-User Acknowledgement - Question #8Access Policies
What is the default action when a new custom category is created and added to an access policy?
Custom CategoriesAccess PolicyDefault ActionCisco WSA - Question #9Proxy Services
Which type of FTP proxy does the Cisco WSA support?
FTP proxyCisco WSAProxy servicesFTP over HTTP - Question #10Access Policies
An administrator wants to restrict file uploads to Facebook using the AVC feature. Under which two actions must the administrator apply this restriction to an access policy? (Choos...
Cisco WSA AVCAccess PoliciesFile Upload RestrictionApplication Control - Question #11Cisco WSA Features
Which two caching modes are available in the Cisco WSA? (Choose two.)
Cisco WSA CachingCaching ModesWeb Security Appliance - Question #12Cisco WSA Features
How does dynamic content analysis improve URL categorization?
URL CategorizationDynamic Content AnalysisContent FilteringCategorization Accuracy - Question #13Decryption Policies to Control HTTPS Traffic
What is needed to enable an HTTPS proxy?
HTTPS ProxySSL DecryptionCertificatesCertificate Generation - Question #14Decryption Policies to Control HTTPS Traffic
Which two configuration options can be configured when invalid certificates are processed with the HTTPS proxy on WSA enabled? (Choose two.)
HTTPS ProxyCertificate ValidationWSA ConfigurationDecryption Policy Actions - Question #15Cisco WSA DVS and AMP
What is the purpose of using AMP file analysis on a Cisco WSA to continuously evaluate emerging threats?
Cisco AMPWSARetrospective analysisMalware detection - Question #16Decryption
Which type of certificate must be installed on a Cisco WSA for HTTPS inspection?
HTTPS InspectionCertificate ManagementCisco WSADecryption - Question #17Data Loss Prevention
Which two log types does the Cisco WSA provide to troubleshoot Cisco data security and external data loss prevention policies? (Choose two.)
Cisco WSALoggingData Loss PreventionTroubleshooting - Question #18Proxy Services
Which port is configured in a browser to use the Cisco WSA web proxy with default settings?
Cisco WSAWeb ProxyDefault PortExplicit Proxy - Question #19Differentiated Traffic Access Policies and Identification Profiles
What is a benefit of integrating Cisco WSA with TrustSec in ISE?
WSA-ISE IntegrationTrustSec SGTWeb Access PoliciesContent Filtering - Question #20Access Policies
When an access policy is created, what is the default option for the Application Settings?
Access PolicyApplication SettingsCisco WSADefault Configuration - Question #21Reporting and Tracking Web Transactions
What is the primary benefit of using Cisco Advanced Web Security Reporting?
Web Security ReportingCisco WSAMalware RiskThreat Intelligence - Question #22Cisco WSA Deployment
Drag and Drop Question Drag and drop the Cisco WSA methods from the left onto the correct deployment modes on the right. Answer:
Cisco WSA deploymentDeployment methodsDeployment modesNetwork integration - Question #23Proxy Services
Drag and Drop Question Drag and drop the properties from the left onto the correct advanced web proxy setting descriptions on the right. Answer:
Web ProxyCisco WSAAdvanced SettingsConfiguration - Question #24Decryption Policies to Control HTTPS Traffic
Drag and Drop Question Drag and drop the actions from the left into the correct order on the right in which they occur as an HTTPS session passes through the Cisco WSA. Answer:
HTTPS traffic processingCisco WSADecryption flowPolicy evaluation - Question #25Cisco WSA Policies
Drag and Drop Question Drag and drop the Cisco WSA access policy elements from the left into the order in which they are processed on the right. Answer:
Cisco WSAAccess PoliciesPolicy Processing OrderWeb Security - Question #26Access Policies
Drag and Drop Question Drag and drop the access policy options from the left onto the correct descriptions on the right. Answer:
Access policiesCisco WSAWeb security policiesPolicy configuration - Question #27Cisco WSA Management and Troubleshooting
Which command allows the administrator to access the Cisco WSA on a secure channel on port 8443?
Cisco WSA AdministrationSecure AccessHTTPSCLI Commands - Question #28Reporting and Tracking Web Transactions
An engineer is used the reporting feature on a WSA. Which option must they consider about the reporting capabilities?
WSA ReportingReporting CapabilitiesReport FilteringWeb Transaction Tracking - Question #29Cisco WSA Authentication
What causes authentication failures on a Cisco WSA when LDAP is used for authentication?
Cisco WSALDAP AuthenticationAuthentication FailuresCharacter Sets - Question #30Cisco WSA Policies
Refer to the exhibit. Which statement about the transaction log is true?
Transaction logPolicy groupCisco WSALogging - Question #31Proxy Services
Which two features can be used with an upstream and downstream Cisco WSA web proxy to have the upstream WSA identify users by their client IP address? (Choose two.)
Proxy ChainingClient IP IdentificationHTTP HeadersCisco WSA - Question #32Decryption Policies to Control HTTPS Traffic
Which two configuration options are available on a Cisco WSA within a decryption policy? (Choose two.)
WSA Decryption PoliciesHTTPS DecryptionSSL InspectionPolicy Actions - Question #33Differentiated Traffic Access Policies and Identification Profiles
Which information in the HTTP request is used to determine if it is subject to the referrer exceptions feature in the Cisco WSA?
Cisco WSAHTTP headersReferrer exceptionsTraffic identification - Question #34Cisco WSA Explicit and Transparent Design
What is used to configure WSA as an explicit proxy?
Explicit ProxyClient ConfigurationBrowser SettingsWSA Deployment - Question #35Cisco WSA Management and Troubleshooting
Which piece of information is required to perform a policy trace for the Cisco WSA?
Cisco WSAPolicy TraceTroubleshootingWeb Security - Question #36Cisco WSA Explicit and Transparent Design
Which description of the Cisco ASA Connector in a Cisco CWS solution is true?
Cisco ASA ConnectorCisco CWS IntegrationTraffic RedirectionWeb Security Deployment - Question #37Cisco WSA DVS and AMP
Which key is needed to pair a Cisco WSA and Cisco ScanCenter for CTA?
WSA IntegrationScanCenter PairingSSH KeyCTA - Question #38Cisco WSA Malware and Anti-Spyware
What is a benefit of integrating Cisco Cognitive Threat Analytics with a Cisco WSA?
Cisco Cognitive Threat AnalyticsCisco WSAMalware protectionThreat detection - Question #39Cisco WSA DVS and AMP
Which method is used by AMP against zero-day and targeted file-based attacks?
AMPFile ReputationZero-day protectionMalware Defense - Question #40Cisco WSA Management and Troubleshooting
Which behavior is seen while the policy trace tool is used to troubleshoot a Cisco WSA?
Policy traceTroubleshootingCisco WSAAccess logs - Question #41Differentiated Traffic Access Policies
What are all of the available options for configuring an exception to blocking for referred content?
Content BlockingWSA PoliciesReferred ContentException Configuration - Question #42Proxy Services
Which statement about the SOCKS proxy is true?
SOCKS proxyProxy servicesNetwork protocolsGeneral purpose proxy - Question #43Cisco WSA Authentication
Which two parameters are mandatory to control access to websites with proxy authentication on a Cisco WSA? (Choose two.)
Cisco WSAProxy AuthenticationAuthentication RealmCredential Encryption - Question #44WCCP
Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?
Cisco WSAWCCPTransparent ProxyProxy Modes - Question #45Cisco WSA Explicit and Transparent Design
How are HTTP requests handled by the Cisco WSA?
Explicit ProxyTransparent ProxyHTTP Request HandlingWSA Operation - Question #46Reporting and Tracking Web Transactions
What is a valid predefined time range when configuring a Web Tracking query?
Web TrackingCisco WSAReportingQuery parameters - Question #47Proxy Services
When a Cisco WSA is installed with default settings, which port is assigned to the web proxy if the M1 port is used exclusively for management?
Cisco WSADefault ConfigurationNetwork PortsWeb Proxy - Question #48Cisco WSA Explicit and Transparent Design
Which configuration option is suitable for explicit mode deployment?
Explicit ModePAC FileProxy DeploymentCisco WSA - Question #49Reporting and Tracking Web Transactions
By default, which two pieces of information does the Cisco WSA access log contain? (Choose two.)
Cisco WSAAccess LogsLogging DefaultsWeb Transaction Tracking - Question #50Reporting and Tracking Web Transactions
Which two sources provide data to Cisco Advanced Web Security Reporting to create dashboards? (Choose two.)
Web Security ReportingWSA Data SourcesCWS IntegrationAdvanced Reporting