Web usage controls are a feature of Cisco Web Security Appliance (WSA) that allow administrators to define and enforce policies for web access based on URL categories. URL categories are groups of websites that share a common theme or content, such as news, sports, entertainment, etc. Cisco WSA uses the Cisco Dynamic Content Analysis Engine and the Talos Security Intelligence and Research Group to provide accurate and up-to-date URL categorization. Administrators can use the web usage controls to allow, block, warn, or monitor web requests based on the URL category of the destination website. They can also create custom URL categories to include or exclude specific domains or URLs from the predefined categories. Web usage controls help administrators to control web traffic, enhance security, improve productivity, and comply with regulatory and organizational requirements. References :=
Some possible references are:
Web Usage Controls - Cisco Web Security Appliance User Guide, Cisco
Cisco Web Usage Control Filtering Categories Data Sheet, Cisco
Define Custom URL Categories in WSA, Cisco
Question 2
What are two functions of TAXII in threat intelligence sharing? (Choose two.)
Options:
A.
determines the "what" of threat intelligence
B.
Supports STIX information
C.
allows users to describe threat motivations and abilities
D.
exchanges trusted anomaly intelligence information
E.
determines how threat intelligence information is relayed
Answer:
B, E
Explanation:
Explanation:
TAXII, short for Trusted Automated eXchange of Intelligence Information, is a protocol that defines how cyber threat information can be shared via services and message exchanges. It is designed specifically to support STIX information, which is a standardized language for expressing and exchanging cyber threat information. TAXII enables organizations to share STIX information by defining an API that aligns with common sharing models, such as hub and spoke, source/subscriber, and peer-to-peer. TAXII also defines four services that allow users to discover, manage, receive, and request STIX information. Therefore, TAXII supports STIX information and determines how threat intelligence information is relayed. TAXII does not determine the “what” of threat intelligence, as that is the role of STIX. TAXII does not allow users to describe threat motivations and abilities, as that is also part of STIX. TAXII does not exchange trusted anomaly intelligence information, as that is a specific type of threat intelligence that may or may not be represented in STIX. References:
What are STIX/TAXII Standards I Resources I Anomali
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)
Options:
A.
Cisco FTDv configured in routed mode and managed by an FMCv installed in AWS
B.
Cisco FTDv with one management interface and two traffic interfaces configured
C.
Cisco FTDv configured in routed mode and managed by a physical FMC appliance on premises
D.
Cisco FTDv with two management interfaces and one traffic interface configured
E.
Cisco FTDv configured in routed mode and IPv6 configured
Answer:
A, C
Explanation:
Explanation:
Cisco FTDv in AWS can be deployed in two different deployment models: single-instance and cluster. In both models, the FTDv can be configured in routed mode and managed by either an FMCv installed in AWS or a physical FMC appliance on premises. The FTDv can also use Geneve encapsulation for traffic interfaces to support AWS Gateway Load Balancer (GWLB) integration. The following table summarizes the supported deployment model configurations for FTDv in AWS:
Table
Deployment Model
Management Mode
Traffic Mode
Geneve Encapsulation
Single-instance
FMCv in AWS
Routed
Optional
Single-instance
FMC on premises
Routed
Optional
Cluster
FMCv in AWS
Routed
Required
Cluster
FMC on premises
Routed
Required
References :=
Deploy the Threat Defense Virtual on AWS - Cisco
Deploy a Threat Defense Virtual Cluster on AWS - Cisco
Configure Geneve Interfaces in Secure FTDv - Cisco
Deployment of Cisco Secure FTDv and FMCv instances in AWS - Terraform
Solved: FTD virtual appliance in AWS - Cisco Community