A. the default log format can be used
B. the fields"%XC%X n" must be appended to the default access log format
C. any log format can beused , but all WSAs must use the same format
D. any log format can be used. And different WSAs may use different formats
您可能感兴趣的试卷
你可能感兴趣的试题
A. M-Series appliance
B. sawmill for CiscoIronPort
C. the built-in WSA reporting infrastructure
D. Cisco application control engine
A.avoid mentioning the upgrade to the customer
B.schedule a convenient time to upgrade again, backing up the configuration before and after theupgrade
C.contact customer support and ask them to run the upgrade for you
D.immediately show the customer how to run the CLI command upgrade
A.wccp debug enable
B.tailproxylogs
C.tailaccesslogs
D.showswccp
A.scanning streaming media for malware
B.scanning multiple downloads at the same time
C.passing pieces of a download to the client while the download is being scanned
D.passing scanned pieces of the file between two different malware-scanning engines
A.a list of proxy servers that are to be bypassed
B.a list of clients and destinations that will bypass the proxy in transparent mode
C.a list of clients and destinations that will bypass the proxy in explicit forward mode
D.a list of user agents exempt from authentication
A.client reports will display authenticated usernames
B.client reports will display both the username and IP address of the clients
C.client reports are not affected by authentication
D.client reports will display the IP address of the authentication server
最新试题
Why does L4TM require T1 to be in promiscuous mode?()
What is a benefit of NTLMSSP over basic authentication?()
A single transaction can be scanned in parallel by:()
Which file characteristic cannot be used in the Cisco IronPort Data Security policies?()
Which of these is an optional feature,requiring the purchase of a separate license after 30 days?()
TRR and TRT are associated with Which WSA component?()
Bandwidth limits cannot be:()
In AsyncOS 7.0 for web the choice of Authentication Surrogate is?()
Match the troubleshooting tool with one of its features or functions.
Which of these is not an action that is associated with HTTPS decryption policies?()