An engineering team has implemented Transparent User identification on their Cisco Web Security Appliance. How is the user success authenticated?
A. trusted source
B. public key
C. certificate
D. host name
An engineering team has implemented Transparent User identification on their Cisco Web Security Appliance. How is the user success authenticated?
A. trusted source
B. public key
C. certificate
D. host name
Search “Identifying Users Transparently” section for explanation:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_01001.html