Free 300-725 Exam Braindumps (page: 5)

Page 4 of 16

What are all of the available options for configuring an exception to blocking for referred content?

  1. all embedded/referred and all embedded/referred except
  2. selected embedded/referred except, all embedded/referred, and selected embedded/referred
  3. selected embedded/referred and all embedded/referred except
  4. all embedded/referred, selected embedded/referred, and all embedded/referred except

Answer(s): D


Reference:

https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01001.html (procedure)



Which statement about the SOCKS proxy is true?

  1. SOCKS is a general purpose proxy
  2. SOCKS operates on TCP port 80, 443, and 8334
  3. SOCKS is used only for traffic that is redirected through a firewall
  4. SOCKS is used for UDP traffic only

Answer(s): A


Reference:

http://www.jguru.com/faq/view.jsp?EID=227532



Which two parameters are mandatory to control access to websites with proxy authentication on a Cisco WSA? (Choose two.)

  1. External Authentication
  2. Identity Enabled Authentication
  3. Transparent User Identification
  4. Credential Encryption
  5. Authentication Realm

Answer(s): D,E


Reference:

https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_appendix_010111.html



What is a valid predefined time range when configuring a Web Tracking query?

  1. year
  2. minute
  3. hour
  4. month

Answer(s): B

Explanation:

Web tracking query uses minute as a predefined time range to track web related queries.






Post your Comments and Discuss Cisco® 300-725 exam with other Community members:

300-725 Discussions & Posts