What causes authentication failures on a Cisco WSA when LDAP is used for authentication?
Refer to the exhibit.
Which statement about the transaction log is true?
Which two features can be used with an upstream and downstream Cisco WSA web proxy to have the upstream WSA identify users by their client IP address? (Choose two.)
Which two configuration options are available on a Cisco WSA within a decryption policy? (Choose two.)
Which information in the HTTP request is used to determine if it is subject to the referrer exceptions feature in the Cisco WSA?