300-725: Securing the Web with Cisco Web Security Appliance (SWSA)

300-725: Securing the Web with Cisco Web Security Appliance (SWSA)

The Securing the Web with Cisco Web Security Appliance v1.0 (SWSA 300-725) exam is a 90-minute exam associated with the CCNP Security, and Cisco Certified Specialist - Web Content Security certifications. This exam tests a candidate's knowledge of Cisco Web Security Appliance, including proxy services, authentication, decryption policies differentiated traffic access policies and identification policies, acceptable use control settings, malware defense, and data security and data loss prevention. The course, Securing Web with Cisco Email Security Appliance, helps candidates to prepare for this exam.

This exam tests your knowledge of Cisco Web Security Appliance, including:

◉ Proxy services
◉ Authentication
◉ Decryption policies
◉ Differentiated traffic access policies and identification policies
◉ Acceptable use control settings
◉ Malware defense
◉ Data security and data loss prevention

300-725: Securing the Web with Cisco Web Security Appliance (SWSA)


Cisco 300-725 Exam Overview:

Exam NameSecuring the Web with Cisco Web Security Appliance
Exam Number 300-725 SWSA
Exam Number $300 USD
Duration 90 minutes
Number of Questions 55-65
Passing Score Variable (750-850 / 1000 Approx.)
Recommended Training Securing the Web with Cisco Web Security Appliance (SWSA)
Sample Questions Cisco 300-725 Sample Questions
Practice Exam Cisco Certified Specialist Web Content Security Practice Test


Cisco 300-725 Exam Topics:


Section Weight  Objectives
Cisco WSA Features 10%

- Describe Cisco WSA features and functionality

◉ Proxy service
◉ Cognitive Threat Analytics
◉ Data loss prevention service
◉ Integrated L4TM service
◉ Management tools

- Describe WSA solutions

◉ Cisco Advanced Web Security Reporting
◉ Cisco Content Security Management Appliance

- Integrate Cisco WSA with Splunk
- Integrate Cisco WSA with Cisco ISE
- Troubleshoot data security and external data loss using log files

Configuration 20%

- Perform initial configuration tasks on Cisco WSA
- Configure an Acceptable Use Policy
- Configure and verify web proxy features

◉ Explicit proxy functionality
◉ Proxy access logs using CLI
◉ Active directory proxy authentication

- Configure a referrer header to filter web categories

Proxy Services 10%

- Compare proxy terms

◉ Explicit proxy vs. transparent proxy
◉ Upstream proxy vs. downstream proxy

- Describe tune caching behavior for safety or performance
- Describe the functions of a Proxy Auto-Configuration (PAC) file
- Describe the SOCKS protocol and the SOCKS proxy services

Authentication 10%

- Describe authentication features

◉ Supported authentication protocols
◉ Authentication realms
◉ Supported authentication surrogates supported
◉ Bypassing authentication of problematic agents
◉ Authentication logs for accounting records
◉ Re-authentication

- Configure traffic redirection to Cisco WSA using explicit forward proxy mode
- Describe the FTP proxy authentication
- Troubleshoot authentication issues

Decryption Policies to Control HTTPS Traffic 10%

- Describe SSL and TLS inspection
- Configure HTTPS capabilities

◉ HTTPS decryption policies
◉ HTTPS proxy function
◉ ACL tags for HTTPS inspection
◉ HTTPS proxy and verify TLS/SSL decryption
◉ Certificate types used for HTTPS decryption

- Configure self-signed and intermediate certificates within SSL/TLS transactions

Differentiated Traffic Access Policies and Identification Profiles 10%

- Describe access policies
- Describe identification profiles and authentication
- Troubleshoot using access logs

Acceptable Use Control 10%

- Configure URL filtering
- Configure the dynamic content analysis engine
- Configure time-based & traffic volume acceptable use policies and end user notifications
- Configure web application visibility and control (Office 365, third-party feeds)
- Create a corporate global acceptable use policy
- Implement policy trace tool to verify corporate global acceptable use policy
- Configure WSA to inspect archive file types

Malware Defense 10% - Describe anti-malware scanning
- Configure file reputation filtering and file analysis
- Describe Advanced Malware Protection (AMP)
- Describe integration with Cognitive Threat Analytics
Reporting and Tracking Web Transactions 10%

- Configure and analyze web tracking reports
- Configure Cisco Advanced Web Security Reporting (AWSR)

◉ Basic web usage
◉ Custom filters

- Troubleshoot connectivity issues

0 comments:

Post a Comment