单项选择题X 纠错
A. the proxy blocked an outbound request because the client is infected with malware
B. the proxy blocked access to a site with a low reputation score
C. the proxy blocked access to a site because of a suspicious server response
D. your appliance or the WBRS key is out of support
你可能喜欢
单项选择题
A.if enabled, all HTTPS traffic must be decrypted
B.if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decrypted
C.decrypted HTTPS traffic is sent unencrypted across the enterprise intranet
D.object size can be used to determine whether the HTTPS traffic is to be decrypted
单项选择题
A.the DVS engine can useWebroot and McAfee scanning in parallel
B.the DVS engine generates the WBRS
C.the DVS engine never inspects the client HTTP request
D.the DVS engine is only used for Layer 4 traffic monitoring
单项选择题
A.it is not recommended: the system will not detect more malware
B.it is notpossible : the WSA will accept only one anti-malware license
C.the system will stop all web-based threats
D.it is recommended: the system will detect more malware
单项选择题
A. both active and passive modes FTP are supported
B. by default the FTP proxy uses port 8021
C. access polices may apply to native FTP traffic
D. data loss prevention policies may apply to native FTP traffic
E. authentication is supported in transparent mode
单项选择题
A. a single WSA can have multiple LDAP realms
B. WSA supports LDAP but not NTLM
C. WSA supports NTLM but not LDAP
D. a single WSA can have up to two authentication realms: one for LDAP and for NTLM
单项选择题
A. the default log format can be used
B. the fields"%XC%X n" must be appended to the default access log format
C. any log format can beused , but all WSAs must use the same format
D. any log format can be used. And different WSAs may use different formats
单项选择题
A. M-Series appliance
B. sawmill for CiscoIronPort
C. the built-in WSA reporting infrastructure
D. Cisco application control engine
单项选择题
A.avoid mentioning the upgrade to the customer
B.schedule a convenient time to upgrade again, backing up the configuration before and after theupgrade
C.contact customer support and ask them to run the upgrade for you
D.immediately show the customer how to run the CLI command upgrade
单项选择题
A.wccp debug enable
B.tailproxylogs
C.tailaccesslogs
D.showswccp
单项选择题
A.scanning streaming media for malware
B.scanning multiple downloads at the same time
C.passing pieces of a download to the client while the download is being scanned
D.passing scanned pieces of the file between two different malware-scanning engines