DRAG DROPDrag and drop the properties from the left onto the correct advanced web proxy setting descriptions on the right. Select and Place:Exhibit A:Exhibit B:
Answer(s): A
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_0100.html
Which two configuration options are available on a Cisco WSA within a decryption policy? (Choose two.)
Answer(s): A,C
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01011.html
Which information in the HTTP request is used to determine if it is subject to the referrer exceptions feature in the Cisco WSA?
Answer(s): C
Requests for embedded content usually include the address of the site from which the request originated (this is known as the “referer” field in the request’s HTTP header). This header information is used to determine categorization of the referred content.
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_01100.html
What is used to configure WSA as an explicit proxy?
Answer(s): B
https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/117940-qa-wsa-00.html
Post your Comments and Discuss Cisco® 300-725 exam with other Community members:
Tate Commented on May 12, 2025 This is very good and interesting. Anonymous
To protect our content from bots for real learners like you, we ask you to register for free. Sign in or sign up now to continue with the 300-725 material!