Which two configuration options are available on a Cisco WSA within a decryption policy? (Choose two.)
Click on the arrows to vote for the correct answer
A. B. C. D. E.AC.
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01011.htmlSure, here's a detailed explanation of the available configuration options within a decryption policy on a Cisco Web Security Appliance (WSA):
Pass Through: This option allows traffic to pass through the WSA without being decrypted or inspected. This is typically used for traffic that is already encrypted (e.g., HTTPS traffic) or traffic that should not be decrypted for compliance or privacy reasons.
Warn: This option allows traffic to be decrypted and inspected, but also displays a warning message to the user indicating that their traffic is being monitored. This is useful for organizations that want to enforce their security policies while still maintaining transparency with their users.
Decrypt: This option fully decrypts the traffic and inspects it for security threats, content filtering, and other security policy enforcement. This option is typically used for traffic that is not already encrypted or for traffic that needs to be decrypted for compliance or policy reasons.
Allow: This option allows traffic to pass through the WSA without being decrypted or inspected, but does not display a warning message to the user. This option is not typically recommended for security-conscious organizations as it can leave them vulnerable to attacks.
Block: This option blocks the traffic completely and prevents it from reaching its intended destination. This option is typically used for traffic that is known to be malicious or for traffic that violates the organization's security policies.
In summary, Pass Through, Warn, Decrypt, Allow, and Block are the available configuration options within a decryption policy on a Cisco Web Security Appliance.