Refer to the exhibit. Which statement about the transaction log is true?
A. The log does not have a date and time
B. The proxy had the content and did not contact other servers
C. The transaction used TCP destination port 8187
D. The AnalizeSuspectTraffic policy group was applied to the transaction
What is used to configure WSA as an explicit proxy?
A. IP Spoofing from router
B. Network settings from user browser
C. WCCP redirection from firewall
D. Auto redirection using PBR from switch
What is a benefit of integrating Cisco Cognitive Threat Analytics with a Cisco WSA?
A. It adds additional information to the Cisco WSA reports
B. It adds additional malware protection to the Cisco WSA
C. It provides the ability to use artificial intelligence to block viruses
D. It reduces time to identify threats in the network
Which statement about the SOCKS proxy is true?
A. SOCKS is a general purpose proxy
B. SOCKS operates on TCP port 80, 443, and 8334
C. SOCKS is used only for traffic that is redirected through a firewall
D. SOCKS is used for UDP traffic only
Which two parameters are mandatory to control access to websites with proxy authentication on a Cisco WSA? (Choose two.)
A. External Authentication
B. Identity Enabled Authentication
C. Transparent User Identification
D. Credential Encryption
E. Authentication Realm
A user browses to a company website that is categorized as "Business and Industry" and contains a Facebook post. The user cannot see the Facebook post because the category "Social Networking" is blocked. Which configuration allows the user to see the Facebook post?
A. Option A
B. Option B
C. Option C
D. Option D
Which two caches must be cleared on a Cisco WSA to resolve an issue in processing requests? (Choose two.)
A. authentication cache
B. application cache
C. logging cache
D. DNS cache
E. HTTP cache
Which response code in the access logs indicates that a transaction was blocked due to policy?
A. TCP_DENIED/407
B. TCP_DENIED/401
C. TCP_DENIED/403
D. TCP_DENIED/307
Which action is a valid default for the Global Access Policy in the Application Visibility Control engine on the Cisco WSA?
A. bandwidth limit
B. permit
C. restrict
D. monitor
What must be configured to require users to click through an acceptance page before they are allowed to go to the Internet through the Cisco WSA?
A. Enable End-User Acknowledgement Page and set to Required in Identification Profiles
B. Enable End -User URL Filtering Warning Page and set to Required in Identification Profiles
C. Enable End-User Acknowledgement Page and set to Required in Access Policies
D. Enable End-User URL Filtering Warning Page and set to Required in Access Policies