Firewalls Flashcards

(30 cards)

1
Q

What are the key components of Zero Trust?

A

Identify/device verification, least privilege access, micro segmentation, continuous monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the methods to access firewall management?

A

GUI, CLI, Panorama, API

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do security zones do?

A

Separate traffic based on trust levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name types of policy rules

A

Interzone, Intrazone, Universal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Give examples of zones

A

Trust, Untrust, DMZ, VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does App-ID verify?

A

Applications using protocol and behavioural analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Does App-ID work with SSL?

A

Yes, regardless of port or encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does URL filtering use for classification?

A

Categories and custom allow/block lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List possible actions

A

Allow, Alert, block, continue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 3 types of SSL decryption?

A

SSL Forward Proxy, SSL inbound Inspection, No decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does GlobalProtect provide for mobile users?

A

VPN, endpoint protection, and device posture checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name three VPN deployment types

A

Site-to-site (IPSec), Remote Access (GlobalProtect), Clientless VPN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the High Availability modes?

A

Active/Passive, Active/Active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What features support High Availability?

A

Session sync, redundancy, failover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a custom App-Id used for?

A

Recognising proprietary apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is App Override?

A

Simplifies traffic classification

17
Q

What does User-ID do?

A

Maps users to IPs for identity-based policies

18
Q

Name some user sources

A

Active directory, LDAP, RADIUS, Captive Portal.

19
Q

What do security profiles enhance?

A

Base security policies

20
Q

What does Antivirus do?

A

Detects known malware

21
Q

What does Anti-spyware do?

A

Blocks spyware C2 activity

22
Q

What does vulnerability protection do?

A

Prevents exploits

23
Q

What does File Blocking do?

A

Prevents transfer of certain file types

24
Q

What does WildFire do?

A

Cloud sandbox for unknown files

25
What does SNS security do?
Prevents DNS tunnelling and malware callbacks
26
What does data filtering do?
Prevents data exfiltration
27
What does AutoFocus provide?
Real-time threat context
28
What is MineMeld used for?
Ingesting threat feeds and creating custom IOC’s
29
What is Cortex XSOAR?
SOAR platform for automation and incident response.
30
What compliance checks can be enforced?
AV running, disk encryption, OS patches.