Which two features can be used with an upstream and downstream Cisco WSA web proxy to have the upstream WSA identify users by their client IP address? (Choose two.)
A. X-Forwarded-For
B. high availability
C. web cache
D. via
E. IP spoofing
By default, which two pieces of information does the Cisco WSA access log contain? (Choose two.)
A. HTTP Request Code
B. Content Type
C. Client IP Address
D. User Agent
E. Transaction ID
Which two sources provide data to Cisco Advanced Web Security Reporting to create dashboards? (Choose two.)
A. Cisco WSA devices
B. Cisco ISE
C. Cisco ASAv
D. Cisco Security MARS
E. Cisco Cloud Web Security gateways
Which statement about configuring an identification profile for machine authentication is true?
A. Cloud Web Security Connector mode with an active directory enabled supports machine authentication
B. Identification profile machine ID is supported locally, but the Cisco WSA does not support machine ID authentication
C. Cloud Web Security with Kerberos enabled supports machine authentication
D. If an Active Directory realm is used, identification can be performed for an authenticated user or IP address but not for a machine ID
Which IP address and port are used by default to run the system setup wizard?
A. http://192.168.42.42:80
B. https://192.168.42.42:8080
C. https://192.168.42.10:8443
D. http://192.168.43.42:8080
Which response code in the access logs indicates that a transaction was blocked due to policy?
A. TCP_DENIED/407
B. TCP_DENIED/401
C. TCP_DENIED/403
D. TCP_DENIED/307
Which two features on the Cisco WSA help prevent outbound data loss for HTTP or FTP traffic? (Choose two.)
A. web reputation filters
B. Advanced Malware Protection
C. third-party DLP integration
D. data security filters
E. SOCKS proxy
Which port is configured in a browser to use the Cisco WSA web proxy with default settings?
A. 8080
B. 8443
C. 8021
D. 3128
DRAG DROP
Drag and drop the actions from the left into the correct order on the right in which they occur as an HTTPS session passes through the Cisco WSA.
Select and Place:
DRAG DROP
Drag and drop the access policy options from the left onto the correct descriptions on the right.
Select and Place: