Limited Time Discount Offer
30% Off - Ends in 02:00:00

X

Cisco 650-155 Dumps

Cisco
Cisco IronPort Security Instructor - Web Security
Cisco
Cisco IronPort Security Instructor - Web Security

Questions & Answers for Cisco 650-155

Showing 1-15 of 60 Questions

Question #1

Put the following in the order they are performed on the WSA (top to bottom).

Question #2

Which of the following is an optional feature, requiring the purchase of a separate license
after 30 days? Select exactly 1 answer(s) from the following:

A. HTTPS Inspection

B. L4TM

C. Cisco IronPort Data Security

D. Web Reputation Filtering

Question #3

You see the following entry in the access log.

Which of the following statements is true? Select exactly 1 answer(s) from the following:

A. The website has a reputation above 8.0.

B. The length of the web page is 134 bytes.

C. The transaction was assigned to the default (global) access group.

D. Anti-malware scanning was bypassed.

Question #4

Which statement is true about native FTP proxy authentication?
Select exactly 1 answer(s) from the following:

A. The WSA native FTP proxy does not support authentication when using explicit forward proxy mode.

B. The WSA native FTP proxy supports both NTMLS5P and Basic authentication protocols.

C. The WSA native FTP proxy supports certificate based authentication.

D. The WSA native FTP proxy does not support authentication when using transparent proxy mode.

Question #5

Which of the following statements is true?
Select exactly 1 answer(s) from the following:

A. The overlap of the L4TM allow list and block list is the L4TM grey list.

B. The L4TM allow list overrides the block list.

C. The L4TM block list overrides the allow lists.

D. L4TM allow list and block list overlaps are not permitted.

Question #6

Match the items.

Question #7

PAC files are written in what programming language?
Select exactly 1 answer(s) from the following:

A. PERL

B. Visual Basic

C. JavaScript

D. Java

Question #8

Which of the following is NOT part of the Pre-Installation Worksheet?
Select exactly 1 answer(s) from the following:

A. S-Series interface settings

B. authentication infrastructure

C. deployment options

D. acceptable use policies

Question #9

Match the troubleshooting tool with one of its features or requirements.

Question #10

The S160 is designed for organizations with up to how many users?
Select exactly 1 answer(s) from the following:

A. 10000

B. 1000

C. 5000

D. 500

E. 50000

Question #11

Which of the following is NOT used as a monitoring tool?
Select exactly 1 answer(s) from the following:

A. email alerts

B. CLI commands

C. SNMP Traps

D. Policy Trace

Question #12

Which of the following logs cannot be forwarded by the WSA to a syslog server?
Select exactly 1 answer(s) from the following:

A. Access Logs

B. Default Proxy Logs

C. AVC Engine Logs

D. System Logs

E. Updater Logs

Question #13

Put the following features in the order they are applied.

Question #14

What is the S-Series Proxy Bypass List?
Select exactly 1 answer(s) from the following:

A. a list of proxy servers to be bypassed

B. a list of clients and destinations that will bypass the proxy in explicit forward mode

C. a list of user agents exempt from authentication

D. a list of clients and destinations that will bypass the proxy in transparent mode

Question #15

Match the CLI Command to the use.

×