QUESTION 1
Bandwidth limits cannot be:

A.    overall
B.    per (LDAP) group
C.    per user

Answer: B

QUESTION 2
A single transaction can be scanned in parallel by:

A.    Webroot, Sophos and McAfee
B.    Webroot and Sophos
C.    Sophos and McAfee
D.    None of the above

Answer: B

QUESTION 3
Which option describes the policies that the security administrator can create using Adaptive Scanning?

A.    to scan all content using all malware and antivirus algorithms
B.    to use specifically designated antivirus scanning engines in designated access policies
C.    to block malware and viruses
D.    to use optimized antivirus weighting and scanning algorithms against content types without administrator configuration

Answer: D
Explanation:
Adaptive Scanning is a new content scanning logic introduced on the Cisco IronPort S-Series. This new security feature greatly increases the catch rate for malware embedded in images, Javascript, text, and Flash files. Adaptive Scanning intelligently selects scanners based on numerous criteria, such as the web reputation score, content type, the scanner catch rate for a given content type, and the scanning cost of a given scanner, resulting in up to 35% higher efficacy in blocking malware.

QUESTION 4
Which S-Series CLI command can help troubleshoot WCCP?

A.    weep debug enable
B.    show weep
C.    tail accesslogs
D.    tail proxylogs

Answer: D

QUESTION 5
Which statement is false?

A.    Custom URL categories cannot contain IP addresses.
B.    Custom URL categories cannot override predefined URL categories
C.    Custom URL categories can contain domain names.
D.    Custom URL categories can use regular expressions.

Answer: A

QUESTION 6
For WSA SaaS Access Control, the Identity Provider is:

A.    An ICAP server that the WSA is configured to communicate with
B.    Integrated into the WSA.
C.    Deployed by the SaaS service provider.
D.    Integrated into the Authentication Server.

Answer: B

QUESTION 7
How is PIM usually run?

A.    Via settings in IE or Firefox browsers
B.    Via a network proxy such as Connector
C.    Via a service that runs transparently on the user’s machine and cannot be stopped
D.    Via a login script or GPO at the time that the user logs on

Answer: D

QUESTION 8
Which statement about HTTPS decryption on the WSA is true?

A.    Decrypted HTTPS traffic is sent unencrypted across the enterprise intranet.
B.    Object size can be used to determine whether the HTTPS traffic is to be decrypted.
C.    If WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decrypted
D.    If enabled, all HTTPS traffic must be decrypted.

Answer: C

QUESTION 9
Which of these is not part of the pre_installation worksheet?

A.    authentication infrastructure
B.    acceptable use policies
C.    S-Series interface settings
D.    deployment options

Answer: A

 

Braindump2go New Released Cisco 700-281 Dump PDF Free Dobwload, 66 Questions in all, Passing Your Exam 100% Easily! http://www.braindump2go.com/700-281.html