Questions for the 300-725 were updated on : Nov 14 ,2024
When an access policy is created, what is the default option for the Application Settings?
B
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-
7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01111.html
Which type of FTP proxy does the Cisco WSA support?
C
Explanation:
Reference: https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/117984-qanda-wsa-00.html
Which two types of reports are scheduled on the Cisco WSA to analyze traffic? (Choose two.)
A D
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-
0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_010101.pdf (8)
Which port is configured in a browser to use the Cisco WSA web proxy with default settings?
D
Explanation:
Reference: https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Aug2013/CVD-
WebSecurityUsingCiscoWSADesignGuide-AUG13.pdf (16)
What is needed to enable an HTTPS proxy?
C
Explanation:
Reference: https://community.cisco.com/t5/web-security/cisco-wsa-https-proxy-certificate-issue/td-p/3019392
Which method is used by AMP against zero-day and targeted file-based attacks?
D
Explanation:
Reference: https://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/advanced-malware-protection/solution-
overview-c22-734228.html
Which action is a valid default for the Global Access Policy in the Application Visibility Control engine on the Cisco WSA?
D
Explanation:
Reference: https://hrouhani.org/cisco-web-security-appliance-ironport/
Which two configuration options are available on a Cisco WSA within a decryption policy? (Choose two.)
A C
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-
7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01011.html
Which configuration mode does the Cisco WSA use to create an Active Directory realm for Kerberos authentication?
D
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-
0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_01001.html#con_1406137
Which statement about configuring an identification profile for machine authentication is true?
C
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-
0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_01001.html
A user browses to a company website that is categorized as Business and Industry and contains a Facebook post. The
user cannot see the Facebook post because the category Social Networking is blocked.
Which configuration allows the user to see the Facebook post?
A
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-
7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01001.html
What must be configured first when creating an access policy that matches the Active Directory group?
C
Explanation:
Reference: https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/118005-configure-ntlm-00.html
Which response code in the access logs indicates that a transaction was blocked due to policy?
A
Explanation:
Reference: https://docuri.com/download/instructions_59a8d562f581719e12ad43fe_pdf
What must be configured to require users to click through an acceptance page before they are allowed to go to the Internet
through the Cisco WSA?
C
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-
0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_010100.html
How does the Cisco WSA choose which scanning engine verdict to use when there is more than one verdict?
B
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-
0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_010000.html