Esame 300-725 SWSA Securing the Web with Cisco Web Security Appliance

Securing the Web with Cisco Web Security Appliance

Codice Esame : 300-725 SWSA
versione : None
Vendor : Cisco

This exam tests your knowledge of Cisco Web Security Appliance, including: Proxy services Authentication Decryption policies Differentiated traffic access policies and identification policies Acceptable use control settings Malware defense Data security and data loss prevention

Area : Security 
Status : Active 
Esame iniziato il: 24-02-2020 terminato il :  
Durata (minuti): 90
Domande : min None – max None 

Punteggio : min None max None
Costo : 

Exam topics:

  • 1.0 – Cisco WSA Features – 10%
    • 1.1 – Describe Cisco WSA features and functionality 
    • 1.1.a – Proxy service 
    • 1.1.b – Cognitive Threat Analytics 
    • 1.1.c – Data loss prevention service 
    • 1.1.d – Integrated L4TM service 
    • 1.1.e – Management tools 
    • 1.2 – Describe WSA solutions 
    • 1.2.a – Cisco Advanced Web Security Reporting 
    • 1.2.b – Cisco Content Security Management Appliance 
    • 1.3 – Integrate Cisco WSA with Splunk 
    • 1.4 – Integrate Cisco WSA with Cisco ISE 
    • 1.5 – Troubleshoot data security and external data loss using log files 
  • 2.0 – Configuration – 20%
    • 2.1 – Perform initial configuration tasks on Cisco WSA 
    • 2.2 – Configure an Acceptable Use Policy 
    • 2.3 – Configure and verify web proxy features 
    • 2.3.a – Explicit proxy functionality 
    • 2.3.b – Proxy access logs using CLI 
    • 2.3.c – Active directory proxy authentication 
    • 2.4 – Configure a referrer header to filter web categories 
  • 3.0 – Proxy Services – 10%
    • 3.1 – Compare proxy terms 
    • 3.1.a – Explicit proxy vs. transparent proxy 
    • 3.1.b – Upstream proxy vs. downstream proxy 
    • 3.2 – Describe tune caching behavior for safety or performance 
    • 3.3 – Describe the functions of a Proxy Auto-Configuration (PAC) file 
    • 3.4 – Describe the SOCKS protocol and the SOCKS proxy services 
  • 4.0 – Authentication – 10%
    • 4.1 – Describe authentication features 
    • 4.1.a – Supported authentication protocols 
    • 4.1.b – Authentication realms 
    • 4.1.c – Supported authentication surrogates supported 
    • 4.1.d – Bypassing authentication of problematic agents 
    • 4.1.e – Authentication logs for accounting records 
    • 4.1.f – Re-authentication 
    • 4.2 – Configure traffic redirection to Cisco WSA using explicit forward proxy mode 
    • 4.3 – Describe the FTP proxy authentication 
    • 4.4 – Troubleshoot authentication issues 
  • 5.0 – Decryption Policies to Control HTTPS Traffic – 10%
    • 5.1 – Describe SSL and TLS inspection 
    • 5.2 – Configure HTTPS capabilities 
    • 5.2.a – HTTPS decryption policies 
    • 5.2.b – HTTPS proxy function 
    • 5.2.c – ACL tags for HTTPS inspection 
    • 5.2.d – HTTPS proxy and verify TLS/SSL decryption 
    • 5.2.e – Certificate types used for HTTPS decryption 
    • 5.3 – Configure self-signed and intermediate certificates within SSL/TLS transactions 
  • 6.0 – Differentiated Traffic Access Policies and Identification Profiles – 10%
    • 6.1 – Describe access policies 
    • 6.2 – Describe identification profiles and authentication 
    • 6.3 – Troubleshoot using access logs 
  • 7.0 – Acceptable Use Control – 10%
    • 7.1 – Configure URL filtering 
    • 7.2 – Configure the dynamic content analysis engine 
    • 7.3 – Configure time-based & traffic volume acceptable use policies and end user notifications 
    • 7.4 – Configure web application visibility and control (Office 365, third-party feeds) 
    • 7.5 – Create a corporate global acceptable use policy 
    • 7.6 – Implement policy trace tool to verify corporate global acceptable use policy 
    • 7.7 – Configure WSA to inspect archive file types 
  • 8.0 – Malware Defense – 10%
    • 8.1 – Describe anti-malware scanning 
    • 8.2 – Configure file reputation filtering and file analysis 
    • 8.3 – Describe Advanced Malware Protection (AMP) 
    • 8.4 – Describe integration with Cognitive Threat Analytics 
  • 9.0 – Reporting and Tracking Web Transactions – 10%
    • 9.1 – Configure and analyze web tracking reports 
    • 9.2 – Configure Cisco Advanced Web Security Reporting (AWSR) 
    • 9.2.a – Basic web usage 
    • 9.2.b – Custom filters 
    • 9.3 – Troubleshoot connectivity issues 

Link all’esame sul sito ufficiale 300-725 SWSA – Securing the Web with Cisco Web Security Appliance

Follow me

Rispondi

Questo sito usa Akismet per ridurre lo spam. Scopri come i tuoi dati vengono elaborati.