A. the proxy blocked an outbound request because the client is infected with malware
B. the proxy blocked access to a site with a low reputation score
C. the proxy blocked access to a site because of a suspicious server response
D. your appliance or the WBRS key is out of support
您可能感興趣的試卷
你可能感興趣的試題
A.if enabled, all HTTPS traffic must be decrypted
B.if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decrypted
C.decrypted HTTPS traffic is sent unencrypted across the enterprise intranet
D.object size can be used to determine whether the HTTPS traffic is to be decrypted
A.the DVS engine can useWebroot and McAfee scanning in parallel
B.the DVS engine generates the WBRS
C.the DVS engine never inspects the client HTTP request
D.the DVS engine is only used for Layer 4 traffic monitoring
A.it is not recommended: the system will not detect more malware
B.it is notpossible : the WSA will accept only one anti-malware license
C.the system will stop all web-based threats
D.it is recommended: the system will detect more malware
A. both active and passive modes FTP are supported
B. by default the FTP proxy uses port 8021
C. access polices may apply to native FTP traffic
D. data loss prevention policies may apply to native FTP traffic
E. authentication is supported in transparent mode
A. a single WSA can have multiple LDAP realms
B. WSA supports LDAP but not NTLM
C. WSA supports NTLM but not LDAP
D. a single WSA can have up to two authentication realms: one for LDAP and for NTLM
最新試題
In the access log,what does an ACL tag beginning with BLOCK_ADMIN indicate?()
Which of the following is NOT provided by AVC?()
Which credentials must be entered into the S-Series GUI when joining the Active domain?()
Which statement about HTTPS decryption on the WSA is true?()
Which of these is a drawback in using McAfee heuristic scanning?()
Which of these is not an action that is associated with HTTPS decryption policies?()
Which statement is true?()
If a web site is blocked because it has a low web reputation score, which of the following iscontained in the un-customized End-User Notification?()
For WSA SaaS Access Control, the Identity Provider is:()
Which of these is the best way to convince a prospect of the benefits of the S-Series?()