单项选择题Which of these is not an action that is associated with HTTPS decryption policies?()

A. drop
B. pass-through
C. decrypt
D. block


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题What are PAC files used for?() 

A. explicit forward mode proxy deployments
B. L4TM
C. transparent mode proxy deployments
D. user agent-based policies

2.单项选择题In the access log,what does an ACL tag beginning with BLOCK_ADMIN indicate?() 

A. the destination was manually added to the block list
B. the malware category is set to blocking mode
C. the transaction was blocked because of application or object properties
D. the transaction was manually blocked by the administrative user

3.单项选择题Which of these can not be used in defining policies?()

A.time of day
B.user agent
C.proxy port
D.usage quotas

4.单项选择题What does the appearance of the ACL tag BLOCK_WBRS in the access log mean?() 

A. the proxy blocked an outbound request because the client is infected with malware
B. the proxy blocked access to a site with a low reputation score
C. the proxy blocked access to a site because of a suspicious server response
D. your appliance or the WBRS key is out of support

5.单项选择题Which statement about HTTPS decryption on the WSA is true?() 

A.if enabled, all HTTPS traffic must be decrypted
B.if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decrypted
C.decrypted HTTPS traffic is sent unencrypted across the enterprise intranet
D.object size can be used to determine whether the HTTPS traffic is to be decrypted

6.单项选择题Which statement about the DVS engine is true?()

A.the DVS engine can useWebroot and McAfee scanning in parallel
B.the DVS engine generates the WBRS
C.the DVS engine never inspects the client HTTP request
D.the DVS engine is only used for Layer 4 traffic monitoring

7.单项选择题Which statement about using McAfee and Webroot together is true?() 

A.it is not recommended: the system will not detect more malware
B.it is notpossible : the WSA will accept only one anti-malware license
C.the system will stop all web-based threats
D.it is recommended: the system will detect more malware

8.单项选择题Which statement about the S-Series native FTP proxy is not true?() 

A. both active and passive modes FTP are supported
B. by default the FTP proxy uses port 8021
C. access polices may apply to native FTP traffic
D. data loss prevention policies may apply to native FTP traffic
E. authentication is supported in transparent mode

9.单项选择题Which statement about WSA user authentication is true?() 

A. a single WSA can have multiple LDAP realms
B. WSA supports LDAP but not NTLM
C. WSA supports NTLM but not LDAP
D. a single WSA can have up to two authentication realms: one for LDAP and for NTLM

10.单项选择题Which statement about WSA access logs that are to be processed by sawmill for cisco ironport istrue?() 

A. the default log format can be used
B. the fields"%XC%X n" must be appended to the default access log format
C. any log format can beused , but all WSAs must use the same format
D. any log format can be used. And different WSAs may use different formats