單項選擇題Which of these is not an action that is associated with HTTPS decryption policies?()

A. drop
B. pass-through
C. decrypt
D. block


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題What are PAC files used for?() 

A. explicit forward mode proxy deployments
B. L4TM
C. transparent mode proxy deployments
D. user agent-based policies

2.單項選擇題In the access log,what does an ACL tag beginning with BLOCK_ADMIN indicate?() 

A. the destination was manually added to the block list
B. the malware category is set to blocking mode
C. the transaction was blocked because of application or object properties
D. the transaction was manually blocked by the administrative user

3.單項選擇題Which of these can not be used in defining policies?()

A.time of day
B.user agent
C.proxy port
D.usage quotas

4.單項選擇題What does the appearance of the ACL tag BLOCK_WBRS in the access log mean?() 

A. the proxy blocked an outbound request because the client is infected with malware
B. the proxy blocked access to a site with a low reputation score
C. the proxy blocked access to a site because of a suspicious server response
D. your appliance or the WBRS key is out of support

5.單項選擇題Which statement about HTTPS decryption on the WSA is true?() 

A.if enabled, all HTTPS traffic must be decrypted
B.if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decrypted
C.decrypted HTTPS traffic is sent unencrypted across the enterprise intranet
D.object size can be used to determine whether the HTTPS traffic is to be decrypted