DRAG DROP Drag and drop the Cisco WSA methods from the left onto the correct deployment modes on the right.
Question No 2
What causes authentication failures on a Cisco WSA when LDAP is used for authentication?
Question No 3
Refer to the exhibit.
Which statement about the transaction log is true?
Question No 4
Which two features can be used with an upstream and downstream Cisco WSA web proxy to have
the upstream WSA identify users by their client IP address? (Choose two.)
Question No 5
Which two configuration options are available on a Cisco WSA within a decryption policy? (Choose
two.)