REAL QUESTIONS SUBMIT MATERIAL ADVERTISE
Braindumps

Microsoft

Cisco

Citrix

CIW

CompTia

CWNA

Apple

Adobe

HP

Legato

Exin

Filemaker

Brocade

Ericsson

TIA

Veritas

ISEB

SCP

IISFA

ISM

OMG

Apc

Mile2

Foundry

Huawei

McData

Symantec

TeraData

RedHat

Solar Winds

Blue Coat

Riverbed

 

 
 
Click on name of dumper to view the dump
 
Shinza
 
 

 

Braindumps of 650-154
ISPWS Cisco IronPort Security Professional Web Security

 

Exam Questions, Answers, Braindumps (650-154)

The exam is tough but the guide from www.exams.ws was really helpful.

 

QUESTION NO: 1

To bypass WBRS and AV scanning, what should you set the action for the custom URL category to? Select exactly 1 answer(s) from the following:

A. permit

B. bypass

C. monitor

D. allow

Answer: A

QUESTION NO: 2

Per-user bandwidth limits are configured as part of what type of policy? Select exactly 1 answer(s) from the following:

A. user quota policies

B. access policies

C. AVC policies

D. identity policies

Answer: A

QUESTION NO: 3

Which of the following commands is used to tune the WSA proxy caching behavior? Select exactly 1 answer(s) from the following:

A. webcache

B. proxyconfig

C. advancedproxyconfi

D. proxy stat

Answer: C

QUESTION NO: 4

If authentication is enabled, which of the following is true? Select exactly 1 answer(s) from the following:

A. Client reports are not affected by authentication.

B. Client reports will display both the user name and IP address of the clients.

C. Client reports will display authenticated user names.

D. Client reports will display the IP address of the authentication server.

Answer: C

QUESTION NO: 5

When can the user agent field be used to determine the decryption policy? Select exactly 1 answer(s) from the following:

A. only in explicit forward proxy mode

B. always

C. never

D. only in transparent proxy mode

Answer: B

QUESTION NO: 6

Which statement is true about WSA user authentication? Select exactly 1 answer(s) from the following:

A. A single WSA can have up to two authentication realms: one for LDAP and one for NTML.

B. WSA supports NTLM, but not LDAP.

C. A single WSA can have multiple LDAP realms.

D. WSA supports LDAP, but not NTLM.

Answer: C

QUESTION NO: 7

What is a benefit of NTLMSSP over Basic authentication? Select exactly 1 answer(s) from the following:

A. NTLMSSP is more secure than Basic.

B. Basic requires re-authentication with every new domain,

C. NTLMSSP is compatible with OpenLDAP.

D. Basic cannot be used in transparent proxy mode.

Answer: A

QUESTION NO: 8

Which of the following commands is used to view the cache hit rate? Select exactly 1 answer(s) from the following:

A. advancedproxyconfig

B. proxyconfig

C. webcache

D. proxy stat

Answer: D

QUESTION NO: 9

In the System Setup Wizard, the default action for the WSA when malware is detected can be configured. Assume you do not change this setting when running the System Setup Wizard, What will this default action be set to? Select exactly 1 answer(s) from the following:

A. drop

B. monitor

C. block

D. allow

E. pass through

Answer: B

 

650-154


 

 

Braindumps Real exam questions and verified answers - 100% passing guarantee - cheap prices.

 

Free brain dumps Braindumps, notes, books for free

 

Braindumps and Exams - Instant download real exam questions - Passing guarantee.

Follow us on FaceBook
Braindumps on Facebook
 
 
 
 
 

CheckPoint

Linux

Novell

DB/2

Network Appliance

EC-Council

Nortel

McAfee

Juniper

ISACA

PMI

Sybase

EMC

HDI

SNIA

ISC

Sair

IBM

Lotus

Exam Express

3COM

BICSI

DeLL

Enterasys

Extreme Networks

Guidance Software

Computer Associates

Network General

SAS Institute

Alcatel Lucent

SeeBeyond

TruSecure

Polycom

Hyperion

Hitachi

Nokia

Fortinet

Vmware

Fujitsu

Tibco

Intel

PostgreSQLCE

BusinessObjects

RESSoftware

BlackBerry

AccessData

ICDL

Isilon

SAP

The Open Group

ACSM

Altiris

Avaya

Cognos

F5

Genesys

SDI

ACI

ASQ

Google

H3C

HIPAA

HRCI

SOA

IIBA

Zend