Application Control Flashcards

1
Q

Does Application Control use proxy-based scans?

A

No, it uses flow-based and IP engine to match patterns of the application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What evasive techniques do P2P apps use to evade firewalls?

A

Port randomization, pinholes, and changing encryption patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is the application control database the same as the IPS database?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are unknown applications in the Application Control profile?

A

Apps that don’t match an application control signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What can cause decreased performance when using application control?

A

When an app is unknown it is logged, if you have many unknown apps you get frequent logs and decreased performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is QUIC?

A

It is a protocol from Google that uses UDP instead of TCP for web access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does allowing QUIC do?

A

FTG inspects Google Chrome Packets for a QUIC heather and logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does Blocking QUIC do?

A

FTG blocks WUIC and forces Google Chrome to use HTTP2/TLS1.2. By default it is blocked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In what order does FTG apply Application order

A

1 application and filter overriders
2. categories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What comes first Web filtering or Application Control?

A

Application Control then web filtering. Note that web filtering may block something permitted by the application control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Do you need Deep-inspection to do application control

A

Yes, if you want to identify apps that are encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When using NGFW policy-based mode for Application control, what must be configured?

A

Consolidated Authentication and SSL inspection policy and SNAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What happens when you configure URL Categories within the same security police as application control?

A

Application control only scans applications in browser-based technology category.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe the process of NGFW Policy-based application filtering

A

Step one traffic is allowed while forwarding packets to IPS engine. (may_dirty) flag set

Step two: IPS identifies session and may update session table with either (dirty or app_valid) flag and App ID

Step three FortiOS kernels relooks up policy using L4 and L7 info. Applies action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the two types of Traffic shaping policies?

A

Shared Shaper
Per-IP Shaper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the Shared Shaper for traffic shaping?

A

Shared Shaper applies a total bandwidth to all traffic using that shaper

17
Q

Define per-IP shaper

A

applies traffic shaping to all source IP adds in the security policy. BW is equally divided among the group.

18
Q

Where are application control logs accessed

A

On the security events pane on the Logs & Report page.

19
Q

Which piece of information’s not included in the application event log when using NGFW policy-based mode?

A

Application control profile name.

20
Q

What URL do you have to check to see if there is an update issue with Application Control?

A

Check if FTG is able to resolve update.fortinet.net

21
Q

What command can you check to check of new application control updates?

A

execute update-now