單項(xiàng)選擇題If authentication is enabled,which statement is true?()

A.client reports will display authenticated usernames
B.client reports will display both the username and IP address of the clients
C.client reports are not affected by authentication
D.client reports will display the IP address of the authentication server


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題Which statement is true?() 

A. the L4TM allow list overrides the block list
B. the overlap of the L4TM allow list and block list is the L4TM grey list
C. the L4TM block lists override the allow lists
D. L4TM allow list and block list overlaps are not permitted

2.單項(xiàng)選擇題Why does L4TM require T1 to be in promiscuous mode?() 

A.to process traffic that is not intended for its MAC address
B.to transmit TCP reset packets
C.to bind with other promiscuous mode ports
D.to receive Ethernet broadcasts

3.單項(xiàng)選擇題Which of these is a drawback in using McAfee heuristic scanning?() 

A. heuristic scanning cannot detect new malware with an unknown signature
B. heuristic scanning requires a separate license key
C. heuristic scanning increases the probability of false positives
D. heuristic scanning increases the probability of false negatives

4.單項(xiàng)選擇題For WSA SaaS Access Control, the Identity Provider is:() 

A. Integrated into the Authentication Server
B. Deployed by theSaaS service provider
C. Integrated into the WSA
D. An ICAP server that the WSA is configured to communicate with

5.單項(xiàng)選擇題In the access log,what does an ACL tag beginning with BLOCK_ADMIN indicate?() 

A. the destination was manually added to the block list
B. the malware category is set to blocking mode
C. the transaction was blocked because of application or object properties
D. the transaction was manually blocked by the administrative user

6.單項(xiàng)選擇題Which of these is an optional feature,requiring the purchase of a separate license after 30 days?()

A. HTTPS Proxy
B. Data Security
C. L4TM
D. Web Reputation filtering

7.單項(xiàng)選擇題Which of these can not be used in defining policies?()

A.time of day
B.user agent
C.proxy port
D.usage quotas

8.單項(xiàng)選擇題What is a benefit of NTLMSSP over basic authentication?() 

A. basic cannot be used in transparent proxy mode
B. basic requiresreauthentication with every new domain
C. NTLMSSP is compatible with open LDAP
D. NTLMSSP is more secure than basic

9.單項(xiàng)選擇題What are PAC files used for?() 

A. explicit forward mode proxy deployments
B. L4TM
C. transparent mode proxy deployments
D. user agent-based policies

10.單項(xiàng)選擇題TRR and TRT are associated with Which WSA component?() 

A. Web Reputation
B. L4TM
C. Anti-Malware
D. URL Filters