how many Cisco WSAs are participating in the WCCP service?

The Web Cache Communication Protocol (WCCP) is a content-routing protocol that can
facilitate the redirection of traffic flows in real time. Your organization has deployed
WCCP to redirect web traffic that traverses their Cisco Adaptive Security Appliances
(ASAs) to their Cisco Web Security Appliances (WSAs).
The simulator will provide access to the graphical user interfaces of one Cisco ASA andone Cisco WSA that are participating in a WCCP service. Not all aspects of the GUIs are
implemented in the simulator. The options that have been implemented are sufficient to
determine the best answer to each of the questions that are presented.
Your task is to examine the details available in the simulated graphical user interfaces and
select the best answer.

How many Cisco ASAs and how many Cisco WSAs are participating in the WCCP
service?

The Web Cache Communication Protocol (WCCP) is a content-routing protocol that can
facilitate the redirection of traffic flows in real time. Your organization has deployed
WCCP to redirect web traffic that traverses their Cisco Adaptive Security Appliances
(ASAs) to their Cisco Web Security Appliances (WSAs).
The simulator will provide access to the graphical user interfaces of one Cisco ASA andone Cisco WSA that are participating in a WCCP service. Not all aspects of the GUIs are
implemented in the simulator. The options that have been implemented are sufficient to
determine the best answer to each of the questions that are presented.
Your task is to examine the details available in the simulated graphical user interfaces and
select the best answer.

How many Cisco ASAs and how many Cisco WSAs are participating in the WCCP
service?

A.
One Cisco ASA or two Cisco ASAs configured as an Active/Standby failover pair, and
one Cisco WSA.

B.
One Cisco ASA or two Cisco ASAs configured as an Active/Active failover pair, and
one Cisco WSA.

C.
One Cisco ASA or two Cisco ASAs configured as an Active/Standby failover pair, and
two Cisco WSAs.

D.
One Cisco ASA or two Cisco ASAs configured as an Active/Active failover pair, and
two Cisco WSAs.

E.
Two Cisco ASAs and one Cisco WSA.

F.
Two Cisco ASAs and two Cisco WSAs.



Leave a Reply 2

Your email address will not be published. Required fields are marked *


Lenia

Lenia

300-210 Questions (Jan/2018 New Updated!)

QUESTION
Which feature requires the network discovery policy for it to work on the Cisco Next Generate fusion Prevent-on System?

A. impact flags
B. URL filtering
C. security intelligence
D. health monitoring

Answer: A

QUESTION
Which CLI command is used to register a Cisco FirePOWER sensor to Firepower Management Center?

A. configure system add
B. configure manager add host
C. configure manager delete
D. configure manger add

Answer: A

QUESTION
In WSA, which two pieces of information are required to implement transparent user identification using Context Directory Agent? (Choose two.)

A. the server name where Context Directory Agent is installed
B. the server name of the global catalog domain controller
C. the backup Context Directory Agent
D. the shared secret
E. the syslog server IP address

Answer: AE

QUESTION
Which three protocols are required when considering firewall rules email services using a Cisco Email Security Appliance?

A. HTTP
B. SMTP
C. TFTP
D. FTP
E. DNS
F. SNMP

Answer: ABE

QUESTION
What are two arguments that can be used with the show content-scan command in Cisco lOS software? (Choose two.)

A. data
B. session
C. buffer
D. statistics
E. verbose

Answer: BD

QUESTION
Which CLI command is used to generate firewall debug messages on a Cisco FirePOWER sensor?

A. system support ssl-debug
B. system support firewall-engine-debug
C. system support capture-traffic
D. system support platform

Answer: C

QUESTION
What is difference between a Cisco Content Security Management virtual appliance and a physical appliance?

A. Migration between virtual appliance of varying sizes is possible, but physical appliances must be of equal size.
B. The virtual appliance requires an additional license to run on a host.
C. The virtual appliance requires an additional license to activate its adapters.
D. The physical appliance is configured with a DHCP-enabled management port to receive an IP Address automatically, but you must assign the virtual appliance an IP address manually in your management subnet.

Answer: B

QUESTION
Which Cisco technology secures the network through malware filtering, category-based control, and reputation-based control?

A. Cisco ASA 5500 Series appliances
B. Cisco IPS
C. Cisco remote-access VPNs
D. Cisco WSA

Answer: D

QUESTION
When using Cisco AMP for Networks, which feature copies a file to the Cisco AMP cloud for analysis?

A. Spero analysis
B. dynamic analysis
C. sandbox analysis
D. malware analysis

Answer: B

QUESTION
Which piece of information is required to perform a policy trace for the Cisco WSA?

A. the destination IP address of the trace
B. the source IP address of the trace
C. the URL to trace
D. authentication credentials to make the request

Answer: C