March Sale Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Cisco 300-725 Dumps

Page: 1 / 2
Total 60 questions

Securing the Web with Cisco Web Security Appliance (300-725 SWSA) Questions and Answers

Question 1

When a Cisco WSA is installed with default settings, which port is assigned to the web proxy if the M1 port is used exclusively for management?

Options:

A.

T1

B.

P2

C.

T2

D.

P1

Question 2

Which behavior is seen while the policy trace tool is used to troubleshoot a Cisco WSA?

Options:

A.

External DLP polices are evaluated by the tool

B.

A real client request is processed and an EUN page is displayed

C.

SOCKS policies are evaluated by the tool

D.

The web proxy does not record the policy trace test requests in the access log when the tool is in use

Question 3

Which key is needed to pair a Cisco WSA and Cisco ScanCenter for CTA?

Options:

A.

public SSH key that the Cisco WSA generates

B.

public SSH key that Cisco ScanCenter generates

C.

private SSH key that Cisco ScanCenter generates

D.

private SSH key that the Cisco WSA generates

Question 4

When an access policy is created, what is the default option for the Application Settings?

Options:

A.

Use Global Policy Applications Settings

B.

Define the Applications Custom Setting

C.

Set all applications to Block

D.

Set all applications to Monitor

Question 5

Which type of certificate must be installed on a Cisco WSA for HTTPS inspection?

Options:

A.

server

B.

client

C.

root

D.

wildcard

Question 6

Drag and drop the Cisco WSA methods from the left onto the correct deployment modes on the right.

Options:

Question 7

Refer to the exhibit.

Which command displays this output?

Options:

A.

grep

B.

logconfig

C.

rollovernow

D.

tail

Question 8

Which statement about Cisco Advanced Web Security Reporting integration is true?

Options:

A.

AWSR uses IP addresses to differentiate Cisco WSA deployments

B.

AWSR does not require a license to index data

C.

AWSR can remove log files after they are indexed

D.

AWSR installation is CLI-based on Windows and Red Hat Linux systems

Question 9

Which response code in the access logs indicates that a transaction was blocked due to policy?

Options:

A.

TCP_DENIED/407

B.

TCP_DENIED/401

C.

TCP_DENIED/403

D.

TCP_DENIED/307

Page: 1 / 2
Total 60 questions