What are all of the available options for configuring an exception to blocking for referred content?
Click on the arrows to vote for the correct answer
A. B. C. D.D.
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01001.htmlThe Cisco Web Security Appliance (WSA) is a security solution designed to protect organizations from web-based threats by filtering web traffic and blocking access to malicious or inappropriate content. One of the features of WSA is the ability to configure exceptions to the blocking of referred content.
Referred content refers to the resources that a web page loads from external sources, such as images, videos, scripts, and stylesheets. By default, WSA blocks access to referred content that matches a certain set of criteria, such as content that is hosted on known malicious domains, or content that contains specific types of malware.
However, in some cases, an organization may want to allow access to referred content that would otherwise be blocked by WSA. For example, a company may have a legitimate business need to access content hosted on a domain that is flagged as malicious by WSA. In such cases, an exception can be configured to allow access to the referred content.
The available options for configuring an exception to blocking for referred content are:
A. all embedded/referred and all embedded/referred except B. selected embedded/referred except, all embedded/referred, and selected embedded/referred C. selected embedded/referred and all embedded/referred except D. all embedded/referred, selected embedded/referred, and all embedded/referred except.
Option A includes two sub-options:
Option B includes three sub-options:
Option C includes two sub-options:
Option D includes three sub-options:
In summary, the available options for configuring an exception to blocking for referred content in WSA are all embedded/referred, all embedded/referred except, selected embedded/referred, and selected embedded/referred except. The specific option to choose will depend on the organization's security policy and the specific content that needs to be accessed.