Which response code in the access logs indicates that a transaction was blocked due to policy?
Correct Answer:
A
Which key is needed to pair a Cisco WSA and Cisco ScanCenter for CTA?
Correct Answer:
A
Refer to the exhibit.
Which statement about the transaction log is true?
Correct Answer:
D
What is needed to enable an HTTPS proxy?
Correct Answer:
C
Which information in the HTTP request is used to determine if it is subject to the referrer exceptions feature in the Cisco WSA?
Correct Answer:
C
Requests for embedded content usually include the address of the site from which the request originated (this is known as the “referer” field in the request’s HTTP header). This header information is used to determine categorization of the referred content.
Reference https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/ b_WSA_UserGuide_chapter_01100.html