A.if enabled, all HTTPS traffic must be decrypted
B.if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decrypted
C.decrypted HTTPS traffic is sent unencrypted across the enterprise intranet
D.object size can be used to determine whether the HTTPS traffic is to be decrypted
您可能感興趣的試卷
你可能感興趣的試題
A.the DVS engine can useWebroot and McAfee scanning in parallel
B.the DVS engine generates the WBRS
C.the DVS engine never inspects the client HTTP request
D.the DVS engine is only used for Layer 4 traffic monitoring
A.it is not recommended: the system will not detect more malware
B.it is notpossible : the WSA will accept only one anti-malware license
C.the system will stop all web-based threats
D.it is recommended: the system will detect more malware
A. both active and passive modes FTP are supported
B. by default the FTP proxy uses port 8021
C. access polices may apply to native FTP traffic
D. data loss prevention policies may apply to native FTP traffic
E. authentication is supported in transparent mode
A. a single WSA can have multiple LDAP realms
B. WSA supports LDAP but not NTLM
C. WSA supports NTLM but not LDAP
D. a single WSA can have up to two authentication realms: one for LDAP and for NTLM
A. the default log format can be used
B. the fields"%XC%X n" must be appended to the default access log format
C. any log format can beused , but all WSAs must use the same format
D. any log format can be used. And different WSAs may use different formats
最新試題
Match the log file with its role in troubleshooting.
Which of these is a drawback in using McAfee heuristic scanning?()
What feature on the WSA provides Day Zero Revocation of access to third party sites such as Salesforce?()
Which of the following is true about Outbound Malware Scanning?()
Which of these can not be used in defining policies?()
Which of these is an optional feature,requiring the purchase of a separate license after 30 days?()
Which file characteristic cannot be used in the Cisco IronPort Data Security policies?()
Match the interface with the use on the WSA.
What is a benefit of NTLMSSP over basic authentication?()
Which of these is not an action that is associated with HTTPS decryption policies?()