Free 300-725 Exam Braindumps (page: 2)

Page 1 of 16

DRAG DROP
Drag and drop the Cisco WSA methods from the left onto the correct deployment modes on the right.
Select and Place:
Exhibit A:



Exhibit B:

  1. Please refer to Exhibit B for answer.

Answer(s): A

Explanation:

You could use an explicit setting (browser config/PAC/WPAD) or transparent (WCCP/PBR) to point to the first proxy and then the first proxy will route based on category to one of the two upstream proxies based on your policy configuration.


Reference:

https://community.cisco.com/t5/web-security/route-to-wsa-based-on-destination/td-p/2491179



What causes authentication failures on a Cisco WSA when LDAP is used for authentication?

  1. when the passphrase contains only 5 characters
  2. when the passphrase contains characters that are not 7-bit ASCI
  3. when the passphrase contains one of following characters ‘@ # $ % ^’
  4. when the passphrase contains 50 characters

Answer(s): B


Reference:

https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_appendix_011001.html



Refer to the exhibit. Which statement about the transaction log is true?

  1. The log does not have a date and time
  2. The proxy had the content and did not contact other servers
  3. The transaction used TCP destination port 8187
  4. The AnalizeSuspectTraffic policy group was applied to the transaction

Answer(s): D



Which two features can be used with an upstream and downstream Cisco WSA web proxy to have the upstream WSA identify users by their client IP address? (Choose two.)

  1. X-Forwarded-For
  2. high availability
  3. web cache
  4. via
  5. IP spoofing

Answer(s): A,D


Reference:

https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_0100.html






Post your Comments and Discuss Cisco® 300-725 exam with other Community members:

300-725 Discussions & Posts