Cisco 650-155 Dumps

Exam: Cisco IronPort Security Instructor - Web Security

Play Cisco 650-155 VCE files with Avanset VCE Simulator
 

Cisco 650-155 Exam Tutorial

Showing 1-20 of 60 Questions   (Page 1 out of 3)


Question No : 1

Put the following in the order they are performed on the WSA (top to bottom).
Cisco 650-155 question 1


Question No : 2

Which of the following is an optional feature, requiring the purchase of a separate license
after 30 days? Select exactly 1 answer(s) from the following:

A. HTTPS Inspection
B. L4TM
C. Cisco IronPort Data Security
D. Web Reputation Filtering


Question No : 3

You see the following entry in the access log.
Cisco 650-155 question 3
Which of the following statements is true? Select exactly 1 answer(s) from the following:

A. The website has a reputation above 8.0.
B. The length of the web page is 134 bytes.
C. The transaction was assigned to the default (global) access group.
D. Anti-malware scanning was bypassed.


Question No : 4

Which statement is true about native FTP proxy authentication?
Select exactly 1 answer(s) from the following:

A. The WSA native FTP proxy does not support authentication when using explicit forward proxy mode.
B. The WSA native FTP proxy supports both NTMLS5P and Basic authentication protocols.
C. The WSA native FTP proxy supports certificate based authentication.
D. The WSA native FTP proxy does not support authentication when using transparent proxy mode.


Question No : 5

Which of the following statements is true?
Select exactly 1 answer(s) from the following:

A. The overlap of the L4TM allow list and block list is the L4TM grey list.
B. The L4TM allow list overrides the block list.
C. The L4TM block list overrides the allow lists.
D. L4TM allow list and block list overlaps are not permitted.


Question No : 6

Match the items.
Cisco 650-155 question 6


Question No : 7

PAC files are written in what programming language?
Select exactly 1 answer(s) from the following:

A. PERL
B. Visual Basic
C. JavaScript
D. Java


Question No : 8

Which of the following is NOT part of the Pre-Installation Worksheet?
Select exactly 1 answer(s) from the following:

A. S-Series interface settings
B. authentication infrastructure
C. deployment options
D. acceptable use policies


Question No : 9

Match the troubleshooting tool with one of its features or requirements.
Cisco 650-155 question 9


Question No : 10

The S160 is designed for organizations with up to how many users?
Select exactly 1 answer(s) from the following:

A. 10000
B. 1000
C. 5000
D. 500
E. 50000


Question No : 11

Which of the following is NOT used as a monitoring tool?
Select exactly 1 answer(s) from the following:

A. email alerts
B. CLI commands
C. SNMP Traps
D. Policy Trace


Question No : 12

Which of the following logs cannot be forwarded by the WSA to a syslog server?
Select exactly 1 answer(s) from the following:

A. Access Logs
B. Default Proxy Logs
C. AVC Engine Logs
D. System Logs
E. Updater Logs


Question No : 13

Put the following features in the order they are applied.
Cisco 650-155 question 13


Question No : 14

What is the S-Series Proxy Bypass List?
Select exactly 1 answer(s) from the following:

A. a list of proxy servers to be bypassed
B. a list of clients and destinations that will bypass the proxy in explicit forward mode
C. a list of user agents exempt from authentication
D. a list of clients and destinations that will bypass the proxy in transparent mode


Question No : 15

Match the CLI Command to the use.
Cisco 650-155 question 15


Question No : 16

What CLI command is used to create a W3C log?
Select exactly 1 answer(s) from the following:

A. logconfig
B. advancedproxyconfig
C. makelog
D. w3clogconfig
E. mklogfile


Question No : 17

What WSA CLI command can be used to search fora stringin a leg?
Select exactly 1 answer(s) from the following:

A. find
B. logview
C. logsearch
D. grep


Question No : 18

Match the interface configuration with the L4TM mode.
Cisco 650-155 question 18


Question No : 19

Which of the following is the DCA engine most closely related to?
Select exactly 1 answer(s) from the following:

A. data security
B. Web Reputation Filters
C. anti-malware scanning
D. URL filters


Question No : 20

Which of the following is not an action associated with HTTPS decryption policies?
Select exactly 1 answer(s) from the following:

A. decrypt
B. block
C. pass through
D. drop


Showing 1-20 of 60 Questions   (Page 1 out of 3)

Close

Close
NOVEMBER DISCOUNT: 20%

Exam-Labs PREMIUM Files

Get 20% Discount on all Exam-Labs.com PREMIUM files!



Enter Your Email Address to Receive Your 20% Discount Code

A Confirmation Link will be sent to this email address to verify your login

We value your privacy.
We will not rent or sell your email address

Close
Download Free Demo of VCE
Exam Simulator

Experience Avanset VCE Exam Simulator for yourself.


Simply submit your e-mail address below to get started with our interactive software demo of your free trial.


Enter Your Email Address

Free Demo Limits: In the demo version you will be able to access only first 5 questions from exam.