A. CLI commands
B. email alerts
C. SNMP traps
D. policy trace
您可能感兴趣的试卷
你可能感兴趣的试题
A. basic cannot be used in transparent proxy mode
B. basic requiresreauthentication with every new domain
C. NTLMSSP is compatible with open LDAP
D. NTLMSSP is more secure than basic
A. Web Reputation
B. L4TM
C. Anti-Malware
D. URL Filters
A. make log
B. log config
C. w3c log config
D. advance dproxy config
E. mklog file
A.to process traffic that is not intended for its MAC address
B.to transmit TCP reset packets
C.to bind with other promiscuous mode ports
D.to receive Ethernet broadcasts
A.resetconfig
B.restoreconfig
C.loadconfig
D.reload
A. drop
B. pass-through
C. decrypt
D. block
A. explicit forward mode proxy deployments
B. L4TM
C. transparent mode proxy deployments
D. user agent-based policies
A. the destination was manually added to the block list
B. the malware category is set to blocking mode
C. the transaction was blocked because of application or object properties
D. the transaction was manually blocked by the administrative user
A.time of day
B.user agent
C.proxy port
D.usage quotas
A. the proxy blocked an outbound request because the client is infected with malware
B. the proxy blocked access to a site with a low reputation score
C. the proxy blocked access to a site because of a suspicious server response
D. your appliance or the WBRS key is out of support
最新试题
Which CLI command is used to create a W3C log?()
When do you need to configure the P1 interface?()
Which statement is true?()
Which of these is not an action that is associated with HTTPS decryption policies?()
If a web site is blocked because it has a low web reputation score, which of the following iscontained in the un-customized End-User Notification?()
Which file characteristic cannot be used in the Cisco IronPort Data Security policies?()
Match the log file with its role in troubleshooting.
Bandwidth limits cannot be:()
Put the following features in the order they are applied.
In AsyncOS 7.0 for web the choice of Authentication Surrogate is?()