Description
Exam Name: Securing the Web with Cisco Web Security Appliance
Related Certification(s):
- Cisco Certified Network Professional CCNP Certifications
- Cisco Certified Network Professional Security CCNP Security Certifications
Certification Provider: Cisco
Number of 300-725 practice questions in our database:
Expected 300-725 Exam Topics, as suggested by Cisco :
- Module 1: Troubleshoot Data Security And External Data Loss Troubleshoot Data Security And External Data Loss Using Log Files/ Integrate Cisco WSA With Splunk
- Module 2: Cisco Content Security Management Appliance/ Describe Cisco WSA Features And Functionality
- Module 3: Cisco Advanced Web Security Reporting/ Integrate Cisco WSA With Cisco ISE
- Module 4: Configure A Referrer Header To Filter Web Categories/ Perform Initial Configuration Tasks On Cisco WSA
- Module 5: Configure And Verify Web Proxy Features/ Active Directory Proxy Authentication/ Data Loss Prevention Service
- Module 6: Describe The SOCKS Protocol And The SOCKS Proxy Services/ Describe Tune Caching Behavior For Safety Or Performance
- Module 7: Describe The Functions Of A Proxy Auto-Configuration (PAC) File/ Configure An Acceptable Use Policy
- Module 8: Explicit Proxy Functionality/ Upstream Proxy Vs. Downstream Proxy/ Explicit Proxy Vs. Transparent Proxy
- Module 9: Configure Traffic Redirection To Cisco WSA Using Explicit Forward Proxy Mode/ Troubleshoot Authentication Issues
- Module 10: Configure Self-Signed And Intermediate Certificates Within SSL/TLS Transactions/ Describe SSL And TLS Inspection
- Module 11: Certificate Types Used For HTTPS Decryption/ Configure HTTPS Capabilities/ HTTPS Proxy And Verify TLS/SSL Decryption
- Module 12: ACL Tags For HTTPS Inspection/ Cognitive Threat Analytics/ Describe WSA Solutions/ Integrated L4TM Service
- Module 13: Describe Identification Profiles And Authentication/ Troubleshoot Using Access Logs/ Describe Access Policies
- Module 14: Implement Policy Trace Tool To Verify Corporate Global Acceptable Use Policy/ Configure WSA To Inspect Archive File Types
- Module 15: Configure Time-Based & Traffic Volume Acceptable Use Policies And End User Notifications/ Create A Corporate Global Acceptable Use Policy
- Module 16: Configure Web Application Visibility And Control (Office 365, Third-Party Feeds)/ Configure The Dynamic Content Analysis Engine
- Module 17: Describe The FTP Proxy Authentication/ Supported Authentication Surrogates Supported
- Module 18: Bypassing Authentication Of Problematic Agents/ Authentication Logs For Accounting Records
- Module 19: Supported Authentication Protocols/ Describe Authentication Features/ Proxy Access Logs Using CLI Using Log Files/ Integrate Cisco WSA With Splunk
- Module 20: Cisco Content Security Management Appliance/ Describe Cisco WSA Features And Functionality
- Module 21: Cisco Advanced Web Security Reporting/ Integrate Cisco WSA With Cisco ISE
- Module 22: Configure A Referrer Header To Filter Web Categories/ Perform Initial Configuration Tasks On Cisco WSA
- Module 23: Configure And Verify Web Proxy Features/ Active Directory Proxy Authentication/ Data Loss Prevention Service
- Module 24: Describe The SOCKS Protocol And The SOCKS Proxy Services/ Describe Tune Caching Behavior For Safety Or Performance
- Module 25: Describe The Functions Of A Proxy Auto-Configuration (PAC) File/ Configure An Acceptable Use Policy
- Module 26: Explicit Proxy Functionality/ Upstream Proxy Vs. Downstream Proxy/ Explicit Proxy Vs. Transparent Proxy
- Module 27: Configure Traffic Redirection To Cisco WSA Using Explicit Forward Proxy Mode/ Troubleshoot Authentication Issues
- Module 28: Describe The FTP Proxy Authentication/ Supported Authentication Surrogates Supported
- Module 29: Bypassing Authentication Of Problematic Agents/ Authentication Logs For Accounting Records
- Module 30: Supported Authentication Protocols/ Describe Authentication Features/ Proxy Access Logs Using CLI
- Module 31: Configure Self-Signed And Intermediate Certificates Within SSL/TLS Transactions/ Describe SSL And TLS Inspection
- Module 32: Certificate Types Used For HTTPS Decryption/ Configure HTTPS Capabilities/ HTTPS Proxy And Verify TLS/SSL Decryption
- Module 33: ACL Tags For HTTPS Inspection/ Cognitive Threat Analytics/ Describe WSA Solutions/ Integrated L4TM Service
- Module 34: Describe Identification Profiles And Authentication/ Troubleshoot Using Access Logs/ Describe Access Policies
- Module 35: Implement Policy Trace Tool To Verify Corporate Global Acceptable Use Policy/ Configure WSA To Inspect Archive File Types
- Module 36: Configure Time-Based & Traffic Volume Acceptable Use Policies And End User Notifications/ Create A Corporate Global Acceptable Use Policy
- Module 37: Configure Web Application Visibility And Control (Office 365, Third-Party Feeds)/ Configure The Dynamic Content Analysis Engine
Reviews
There are no reviews yet.