SYSTEM ADMINISTRATION ACTUAL EXAM
QUESTIONS AND VERIFIED ANSWERS 2026
▶ TCP 6000-6063. Answer: X11: Used for the X Window System, a
graphical user interface system for UNIX and Linux.
▶ TCP 6660-6669. Answer: IRC (Internet Relay Chat): Used for real-time
communication in chat rooms.
▶ Using Cisco Cognitive Threat Analytics, which platform automatically
blocks risky sites, and test unknown sites for hidden advanced threats
before allowing users to click them?
A. Cisco Identity Services Engine
B. Cisco Enterprise Security Appliance
C. Cisco Web Security Appliance
D. Cisco Advanced Stealthwatch Appliance. Answer: C. Cisco Web
Security Appliance
The Cisco Web Security Appliance (WSA) integrates with Cisco Cognitive
Threat Analytics to automatically block risky sites and test unknown sites
for hidden advanced threats before allowing users to click them.
▶ What are two things to consider when using PAC files with the Cisco
WSA? (Choose two.)
A. If the WSA host port is changed, the default port redirects web traffic to
the correct port automatically.
B. PAC files use if-else statements to determine whether to use a proxy or
a direct connection for traffic between the PC and the host.
C. The WSA hosts PAC files on port 9001 by default.
D. The WSA hosts PAC files on port 6001 by default.
E. By default, they direct traffic through a proxy when the PC and the host
are on the same subnet.. Answer: B and C
B. PAC files use if-else statements to determine whether to use a proxy or
a direct connection for traffic between the PC and the host. PAC files
contain JavaScript code that utilizes if-else statements to evaluate
conditions and decide whether to direct web traffic through a proxy or
, establish a direct connection. The conditions can be based on factors such
as URL patterns, IP addresses, or other criteria.
C. The WSA hosts PAC files on port 9001 by default. When using PAC files
with the Cisco WSA, the default port for hosting the PAC file is 9001. The
PAC file is typically accessible through an HTTP request to the WSA on
port 9001, and clients retrieve the PAC file from this location to determine
proxy usage.
▶ Which IETF attribute is supported for the RADIUS CoA feature?
A. 24 State
B. 30 Calling-Station-ID
C. 42 Acct-Session-ID
D. 81 Message-Authenticator. Answer:
▶ PAC. Answer: Proxy Auto Configuration. Method used to automatically
configure systems to use a proxy server.
▶ IETF. Answer: Internet Engineering Task Force - develops and
promotes voluntary Internet standards and protocols, in particular the
standards that comprise the Internet protocol suite (TCP/IP).
▶ Regarding the Common IETF Attributes in RADIUS what attribute
number is State?. Answer: Type: 24
Description: Contains state information that is passed between the NAS
and the RADIUS server.
Usage: Often used in challenge/response authentication methods to
maintain state between requests.
▶ Regarding the Common IETF Attributes in RADIUS what attribute
number is Calling-Station-ID?. Answer: Type: 31
Description: Identifies the phone number or MAC address of the client
device.
Usage: Useful in tracking and identifying devices that are making
authentication requests.
▶ Regarding the Common IETF Attributes in RADIUS what attribute
number is Acct-Session-ID?. Answer: Type: 44
Description: A unique identifier for an accounting session, used in RADIUS
accounting.
QUESTIONS AND VERIFIED ANSWERS 2026
▶ TCP 6000-6063. Answer: X11: Used for the X Window System, a
graphical user interface system for UNIX and Linux.
▶ TCP 6660-6669. Answer: IRC (Internet Relay Chat): Used for real-time
communication in chat rooms.
▶ Using Cisco Cognitive Threat Analytics, which platform automatically
blocks risky sites, and test unknown sites for hidden advanced threats
before allowing users to click them?
A. Cisco Identity Services Engine
B. Cisco Enterprise Security Appliance
C. Cisco Web Security Appliance
D. Cisco Advanced Stealthwatch Appliance. Answer: C. Cisco Web
Security Appliance
The Cisco Web Security Appliance (WSA) integrates with Cisco Cognitive
Threat Analytics to automatically block risky sites and test unknown sites
for hidden advanced threats before allowing users to click them.
▶ What are two things to consider when using PAC files with the Cisco
WSA? (Choose two.)
A. If the WSA host port is changed, the default port redirects web traffic to
the correct port automatically.
B. PAC files use if-else statements to determine whether to use a proxy or
a direct connection for traffic between the PC and the host.
C. The WSA hosts PAC files on port 9001 by default.
D. The WSA hosts PAC files on port 6001 by default.
E. By default, they direct traffic through a proxy when the PC and the host
are on the same subnet.. Answer: B and C
B. PAC files use if-else statements to determine whether to use a proxy or
a direct connection for traffic between the PC and the host. PAC files
contain JavaScript code that utilizes if-else statements to evaluate
conditions and decide whether to direct web traffic through a proxy or
, establish a direct connection. The conditions can be based on factors such
as URL patterns, IP addresses, or other criteria.
C. The WSA hosts PAC files on port 9001 by default. When using PAC files
with the Cisco WSA, the default port for hosting the PAC file is 9001. The
PAC file is typically accessible through an HTTP request to the WSA on
port 9001, and clients retrieve the PAC file from this location to determine
proxy usage.
▶ Which IETF attribute is supported for the RADIUS CoA feature?
A. 24 State
B. 30 Calling-Station-ID
C. 42 Acct-Session-ID
D. 81 Message-Authenticator. Answer:
▶ PAC. Answer: Proxy Auto Configuration. Method used to automatically
configure systems to use a proxy server.
▶ IETF. Answer: Internet Engineering Task Force - develops and
promotes voluntary Internet standards and protocols, in particular the
standards that comprise the Internet protocol suite (TCP/IP).
▶ Regarding the Common IETF Attributes in RADIUS what attribute
number is State?. Answer: Type: 24
Description: Contains state information that is passed between the NAS
and the RADIUS server.
Usage: Often used in challenge/response authentication methods to
maintain state between requests.
▶ Regarding the Common IETF Attributes in RADIUS what attribute
number is Calling-Station-ID?. Answer: Type: 31
Description: Identifies the phone number or MAC address of the client
device.
Usage: Useful in tracking and identifying devices that are making
authentication requests.
▶ Regarding the Common IETF Attributes in RADIUS what attribute
number is Acct-Session-ID?. Answer: Type: 44
Description: A unique identifier for an accounting session, used in RADIUS
accounting.