Cisco® 300-725 Exam Practice Questions (P. 3)
- Full Access (60 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
Which method is used by AMP against zero-day and targeted file-based attacks?
- Aanalyzing behavior of all files that are not yet known to the reputation service
- Bperiodically evaluating emerging threats as new information becomes available
- Cimplementing security group tags
- Dobtaining the reputation of known files
Correct Answer:
D
Reference:
https://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/advanced-malware-protection/solution-overview-c22-734228.html
D
Reference:
https://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/advanced-malware-protection/solution-overview-c22-734228.html
send
light_mode
delete
Question #12
Which behavior is seen while the policy trace tool is used to troubleshoot a Cisco WSA?
- AExternal DLP polices are evaluated by the tool
- BA real client request is processed and an EUN page is displayed
- CSOCKS policies are evaluated by the tool
- DThe web proxy does not record the policy trace test requests in the access log when the tool is in use
Correct Answer:
D
Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/ b_WSA_UserGuide_appendix_011001.html#con_1415277
D
Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/ b_WSA_UserGuide_appendix_011001.html#con_1415277
send
light_mode
delete
Question #13
What are all of the available options for configuring an exception to blocking for referred content?
- Aall embedded/referred and all embedded/referred except
- Bselected embedded/referred except, all embedded/referred, and selected embedded/referred
- Cselected embedded/referred and all embedded/referred except
- Dall embedded/referred, selected embedded/referred, and all embedded/referred except
Correct Answer:
D
Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01001.html
(procedure)
D
Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01001.html
(procedure)
send
light_mode
delete
Question #14
Which statement about the SOCKS proxy is true?
- ASOCKS is a general purpose proxy
- BSOCKS operates on TCP port 80, 443, and 8334
- CSOCKS is used only for traffic that is redirected through a firewall
- DSOCKS is used for UDP traffic only
Correct Answer:
A
Reference:
http://www.jguru.com/faq/view.jsp?EID=227532
A
Reference:
http://www.jguru.com/faq/view.jsp?EID=227532
send
light_mode
delete
Question #15
Which two parameters are mandatory to control access to websites with proxy authentication on a Cisco WSA? (Choose two.)
- AExternal Authentication
- BIdentity Enabled Authentication
- CTransparent User Identification
- DCredential Encryption
- EAuthentication Realm
Correct Answer:
DE
Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_appendix_010111.html
DE
Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_appendix_010111.html
send
light_mode
delete
All Pages