單項(xiàng)選擇題If authentication is enabled,which statement is true?()

A.client reports will display authenticated usernames
B.client reports will display both the username and IP address of the clients
C.client reports are not affected by authentication
D.client reports will display the IP address of the authentication server


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題Which statement is false?() 

A. custom URL categories cannot contain IP addresses
B. custom URL categories cannot override predefined URL categories
C. custom URL categories can contain domain names
D. custom URL categories can use regular expressions

4.單項(xiàng)選擇題Which of these is an optional feature,requiring the purchase of a separate license after 30 days?()

A. HTTPS Proxy
B. Data Security
C. L4TM
D. Web Reputation filtering

5.單項(xiàng)選擇題What does the appearance of the ACL tag BLOCK_WBRS in the access log mean?() 

A. the proxy blocked an outbound request because the client is infected with malware
B. the proxy blocked access to a site with a low reputation score
C. the proxy blocked access to a site because of a suspicious server response
D. your appliance or the WBRS key is out of support

6.單項(xiàng)選擇題Which statement about HTTPS decryption on the WSA is true?() 

A.if enabled, all HTTPS traffic must be decrypted
B.if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decrypted
C.decrypted HTTPS traffic is sent unencrypted across the enterprise intranet
D.object size can be used to determine whether the HTTPS traffic is to be decrypted

7.單項(xiàng)選擇題For WSA SaaS Access Control, the Identity Provider is:() 

A. Integrated into the Authentication Server
B. Deployed by theSaaS service provider
C. Integrated into the WSA
D. An ICAP server that the WSA is configured to communicate with

8.單項(xiàng)選擇題When do you need to configure the P1 interface?()

A. whenever you have an upstream proxy
B. whenever you intend to deploy the L4TM in blocking mode
C. whenever you want to enable the WSA proxy
D. whenever you have a separate management VLAN orsubnetwork

9.單項(xiàng)選擇題Which of the following is true about Outbound Malware Scanning?() 

A. It has its own policy table.
B. It is configured as part of Access Policies.
C. It is configured as part ofIronPort data Security.
D. It only has global configuration.

10.單項(xiàng)選擇題Which of these can not be used in defining policies?()

A.time of day
B.user agent
C.proxy port
D.usage quotas