What causes authentication failures on a Cisco WSA when LDAP is used for authentication?
Refer to the exhibit.
Which statement about the transaction log is true?
Which two features can be used with an upstream and downstream Cisco WSA web proxy to have the upstream WSA identify users by their client IP address? (Choose two.)
Which two configuration options are available on a Cisco WSA within a decryption policy? (Choose two.)
Which information in the HTTP request is used to determine if it is subject to the referrer exceptions feature in the Cisco WSA?
Requests for embedded content usually include the address of the site from which the request originated (this is known as the ''referer'' field in the request's HTTP header). This header information is used to determine categorization of the referred content.