Refer to the exhibit. Which statement about the transaction log is true?
A. The log does not have a date and time
B. The proxy had the content and did not contact other servers
C. The transaction used TCP destination port 8187
D. The AnalizeSuspectTraffic policy group was applied to the transaction
What is a valid predefined time range when configuring a Web Tracking query?
A. year
B. minute
C. hour
D. month
Which configuration option is suitable for explicit mode deployment?
A. PAC
B. WCCP
C. ITD
D. PBR
What is the function of a PAC file on a Cisco WSA?
A. The file allows redirection of web traffic to a specific proxy server
B. The file is mandatory for a transparent proxy to redirect user traffic
C. The file provides instructions about which URL categories are permitted
D. The file is mandatory for an explicit proxy to forward user traffic
Which two modes of operation does the Cisco WSA provide? (Choose two.)
A. connector
B. proxy
C. transparent
D. standard
E. explicit
Which response code in the access logs indicates that a transaction was blocked due to policy?
A. TCP_DENIED/407
B. TCP_DENIED/401
C. TCP_DENIED/403
D. TCP_DENIED/307
Which two configuration options can be configured when invalid certificates are processed with the HTTPS proxy on WSA enabled? (Choose two.)
A. allow
B. monitor
C. drop
D. block
E. redirect
Which port is configured in a browser to use the Cisco WSA web proxy with default settings?
A. 8080
B. 8443
C. 8021
D. 3128
When an access policy is created, what is the default option for the Application Settings?
A. Use Global Policy Applications Settings
B. Define the Applications Custom Setting
C. Set all applications to Block
D. Set all applications to Monitor
DRAG DROP
Drag and drop the Cisco WSA methods from the left onto the correct deployment modes on the right.
Select and Place: