問答題

Match the log file with its role in troubleshooting.


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題Which of the following is NOT provided by AVC?()

A. Safe Search
B. Web usage quotas
C. Deep IM control
D. Media bandwidth control

2.單項(xiàng)選擇題For WSA SaaS Access Control, the Identity Provider is:() 

A. Integrated into the Authentication Server
B. Deployed by theSaaS service provider
C. Integrated into the WSA
D. An ICAP server that the WSA is configured to communicate with

3.單項(xiàng)選擇題Bandwidth limits cannot be:()

A. per (LDAP) group
B. per user
C. overall

4.單項(xiàng)選擇題A single transaction can be scanned in parallel by:()

A. Sophos and McAfee
B. Webroot and Sophos
C. Webroot,Sophos and McAfee
D. None of the above

5.單項(xiàng)選擇題In AsyncOS 7.0 for web the choice of Authentication Surrogate is?()

A. A global setting
B. Defined separately for each Access Policy
C. Defined separately for each Identity
D. Defined separately for each malware engine

6.單項(xiàng)選擇題What feature on the WSA provides Day Zero Revocation of access to third party sites such as Salesforce?()

A. Day Zero Revocation engine
B. SaaS Access Control
C. Dynamic Vectoring and Streaming engine
D. Application Visibility and Control

7.單項(xiàng)選擇題If a web site is blocked because it has a low web reputation score, which of the following iscontained in the un-customized End-User Notification?()

A. The authenticated users,if authentication tool place.
B. The DVS engine verdict.
C. The web reputation score.
D. The Treat Type.

8.單項(xiàng)選擇題Which of the following is true about Outbound Malware Scanning?() 

A. It has its own policy table.
B. It is configured as part of Access Policies.
C. It is configured as part ofIronPort data Security.
D. It only has global configuration.

9.單項(xiàng)選擇題Which of these is not part of the pre_ installation worksheet?()

A. deployment option
B. acceptable use policies
C. S-Series interface settings
D. authentication infrastructure

10.單項(xiàng)選擇題Which statement is true?() 

A. the L4TM allow list overrides the block list
B. the overlap of the L4TM allow list and block list is the L4TM grey list
C. the L4TM block lists override the allow lists
D. L4TM allow list and block list overlaps are not permitted