A.the DVS engine can useWebroot and McAfee scanning in parallel
B.the DVS engine generates the WBRS
C.the DVS engine never inspects the client HTTP request
D.the DVS engine is only used for Layer 4 traffic monitoring
您可能感兴趣的试卷
你可能感兴趣的试题
A.it is not recommended: the system will not detect more malware
B.it is notpossible : the WSA will accept only one anti-malware license
C.the system will stop all web-based threats
D.it is recommended: the system will detect more malware
A. both active and passive modes FTP are supported
B. by default the FTP proxy uses port 8021
C. access polices may apply to native FTP traffic
D. data loss prevention policies may apply to native FTP traffic
E. authentication is supported in transparent mode
A. a single WSA can have multiple LDAP realms
B. WSA supports LDAP but not NTLM
C. WSA supports NTLM but not LDAP
D. a single WSA can have up to two authentication realms: one for LDAP and for NTLM
A. the default log format can be used
B. the fields"%XC%X n" must be appended to the default access log format
C. any log format can beused , but all WSAs must use the same format
D. any log format can be used. And different WSAs may use different formats
A. M-Series appliance
B. sawmill for CiscoIronPort
C. the built-in WSA reporting infrastructure
D. Cisco application control engine
A.avoid mentioning the upgrade to the customer
B.schedule a convenient time to upgrade again, backing up the configuration before and after theupgrade
C.contact customer support and ask them to run the upgrade for you
D.immediately show the customer how to run the CLI command upgrade
A.wccp debug enable
B.tailproxylogs
C.tailaccesslogs
D.showswccp
A.scanning streaming media for malware
B.scanning multiple downloads at the same time
C.passing pieces of a download to the client while the download is being scanned
D.passing scanned pieces of the file between two different malware-scanning engines
A.a list of proxy servers that are to be bypassed
B.a list of clients and destinations that will bypass the proxy in transparent mode
C.a list of clients and destinations that will bypass the proxy in explicit forward mode
D.a list of user agents exempt from authentication
A.client reports will display authenticated usernames
B.client reports will display both the username and IP address of the clients
C.client reports are not affected by authentication
D.client reports will display the IP address of the authentication server
最新试题
Which of these can not be used in defining policies?()
Which of these is an optional feature,requiring the purchase of a separate license after 30 days?()
Which credentials must be entered into the S-Series GUI when joining the Active domain?()
Which of these is not part of the pre_ installation worksheet?()
Which statement is false?()
Which of these is the best way to convince a prospect of the benefits of the S-Series?()
What are PAC files used for?()
What feature on the WSA provides Day Zero Revocation of access to third party sites such as Salesforce?()
If a web site is blocked because it has a low web reputation score, which of the following iscontained in the un-customized End-User Notification?()
Match the troubleshooting tool with one of its features or functions.