CISCO
300-207
Implementing Cisco Threat Control Solutions (SITCS)
Question:
1
|
During initial configuration,
the Cisco ASA can be configured to drop all traffic if the ASA CX SSP fails by
using which command in a policy-map?
A. cxsc fail
B. cxsc fail-close
C. cxsc fail-open
D. cxssp fail-close
Answer:
B
|
Question:
2
|
A network engineer may use
which three types of certificates when implementing HTTPS decryption services
on the ASA CX? (Choose three.)
A. Self Signed Server
Certificate
B. Self Signed Root
Certificate
C. Microsoft CA Server
Certificate
D. Microsoft CA Subordinate
Root Certificate
E. LDAP CA Server Certificate
F. LDAP CA Root Certificate
G. Public Certificate
Authority Server Certificate
H. Public Certificate
Authority Root Certificate
Answer:
B,D,F
|
Question:
3
|
Cisco’s ASA CX includes which
two URL categories? (Choose two.)
A. Proxy Avoidance
B. Dropbox
C. Hate Speech
D. Facebook
E. Social Networking
F. Instant Messaging and Video
Messaging
Answer:
C,E
|
Question:
4
|
A Cisco Web Security
Appliance's policy can provide visibility and control of which two elements?
(Choose two.)
A. Voice and Video
Applications
B. Websites with a reputation
between -100 and -60
C. Secure websites with
certificates signed under an unknown CA
D. High bandwidth websites
during business hours
Answer:
C,D
|
Question:
5
|
Which Cisco Web Security
Appliance design requires minimal change to endpoint devices?
A. Transparent Mode
B. Explicit Forward Mode
C. Promiscuous Mode
D. Inline Mode
Answer:
A
|
Question:
6
|
What step is required to
enable HTTPS Proxy on the Cisco Web Security Appliance?
A. Web Security Manager HTTPS
Proxy click Enable
B. Security Services HTTPS
Proxy click Enable
C. HTTPS Proxy is enabled by
default
D. System Administration HTTPS
Proxy click Enable
Answer:
B
|
No comments:
Post a Comment