Download Cisco.300-725.VCEplus.2020-06-24.60q.vcex

Download Exam

File Info

Exam Securing the Web with Cisco Web Security Appliance
Number 300-725
File Name Cisco.300-725.VCEplus.2020-06-24.60q.vcex
Size 2 MB
Posted Jun 24, 2020
Download Cisco.300-725.VCEplus.2020-06-24.60q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Drag and drop the Cisco WSA methods from the left onto the correct deployment modes on the right.


Correct answer: To work with this question, an Exam Simulator is required.
Explanation:
You could use an explicit setting (browser config/PAC/WPAD) or transparent (WCCP/PBR) to point to the first proxy and then the first proxy will route based on category to one of the two upstream proxies based on your policy configuration.Reference: https://community.cisco.com/t5/web-security/route-to-wsa-based-on-destination/td-p/2491179
You could use an explicit setting (browser config/PAC/WPAD) or transparent (WCCP/PBR) to point to the first proxy and then the first proxy will route based on category to one of the two upstream proxies based on your policy configuration.
Reference: https://community.cisco.com/t5/web-security/route-to-wsa-based-on-destination/td-p/2491179



Question 2

What causes authentication failures on a Cisco WSA when LDAP is used for authentication?


  1. when the passphrase contains only 5 characters 
  2. when the passphrase contains characters that are not 7-bit ASCI
  3. when the passphrase contains one of following characters '@ # $ % ^'
  4. when the passphrase contains 50 characters
Correct answer: B
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_appendix_011001.html 
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_appendix_011001.html 



Question 3

 
Refer to the exhibit. Which statement about the transaction log is true?


  1. The log does not have a date and time
  2. The proxy had the content and did not contact other servers
  3. The transaction used TCP destination port 8187
  4. The AnalizeSuspectTraffic policy group was applied to the transaction
Correct answer: D



Question 4

Which two features can be used with an upstream and downstream Cisco WSA web proxy to have the upstream WSA identify users by their client IP address? (Choose two.)


  1. X-Forwarded-For
  2. high availability
  3. web cache
  4. via
  5. IP spoofing
Correct answer: AD
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_0100.html
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_0100.html



Question 5

Drag and drop the properties from the left onto the correct advanced web proxy setting descriptions on the right. 


Correct answer: To work with this question, an Exam Simulator is required.
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_0100.html 
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_0100.html 



Question 6

Which two configuration options are available on a Cisco WSA within a decryption policy? (Choose two.)


  1. Pass Through
  2. Warn
  3. Decrypt
  4. Allow
  5. Block
Correct answer: AC
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01011.html
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01011.html



Question 7

Which information in the HTTP request is used to determine if it is subject to the referrer exceptions feature in the Cisco WSA?


  1. protocol
  2. version
  3. header
  4. payload
Correct answer: C
Explanation:
Requests for embedded content usually include the address of the site from which the request originated (this is known as the "referer" field in the request's HTTP header). This header information is used to determine categorization of the referred content.Reference https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_01100.html
Requests for embedded content usually include the address of the site from which the request originated (this is known as the "referer" field in the request's HTTP header). This header information is used to determine categorization of the referred content.
Reference https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_01100.html



Question 8

What is used to configure WSA as an explicit proxy?


  1. IP Spoofing from router
  2. Network settings from user browser
  3. WCCP redirection from firewall
  4. Auto redirection using PBR from switch
Correct answer: B
Explanation:
Reference: https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/117940-qa-wsa-00.html
Reference: https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/117940-qa-wsa-00.html



Question 9

Which key is needed to pair a Cisco WSA and Cisco ScanCenter for CTA?


  1. public SSH key that the Cisco WSA generates
  2. public SSH key that Cisco ScanCenter generates
  3. private SSH key that Cisco ScanCenter generates
  4. private SSH key that the Cisco WSA generates 
Correct answer: A
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_010111.html
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_010111.html



Question 10

What is a benefit of integrating Cisco Cognitive Threat Analytics with a Cisco WSA?


  1. It adds additional information to the Cisco WSA reports
  2. It adds additional malware protection to the Cisco WSA
  3. It provides the ability to use artificial intelligence to block viruses
  4. It reduces time to identify threats in the network
Correct answer: B
Explanation:
Reference: https://www.ironportstore.com/datasheets/data_sheet_c78-729630.pdf
Reference: https://www.ironportstore.com/datasheets/data_sheet_c78-729630.pdf









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files