Juniper Firewall Terms Flashcards

1
Q

An _____________ is a critical component of network security that continuously monitors network traffic and system activities to identify and mitigate security threats. It goes beyond intrusion detection by taking immediate, automated actions to block or prevent known and emerging threats from compromising the network. _____________ solutions utilize a combination of signature-based detection, anomaly detection, and heuristics to identify suspicious behavior and stop malicious activity in real-time. These systems play a crucial role in protecting networks and data by actively defending against a wide range of cyberattacks, including malware, exploits, and intrusion attempts.

A

Intrusion Prevention System (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____________ are specialized components within firewall or security devices designed to understand and manage specific application-layer protocols. _____________ provide deep packet inspection and context-aware filtering for applications like SIP, FTP, and H.323, ensuring that traffic adheres to protocol-specific security and compliance requirements. By inspecting and controlling application-specific data, _____________ enhance security and the proper functioning of applications within the network.

A

Application Layer Gateways (ALGs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_____________ is a fundamental networking technique used in firewalls and routers to modify source or destination IP addresses in packet headers as they traverse the device. _____________ allows multiple devices in a private network to share a single public IP address, thereby providing security and conserving public IP address space.

A

Network Address Translation (NAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A _____________ is a secure communication method that enables users or networks to establish encrypted connections over untrusted networks, such as the internet. _____________s provide data confidentiality, integrity, and authentication. They include several types, such as site-to-site _____________s for connecting entire networks, remote access _____________s for individual users, and SSL _____________s for secure web-based access to resources. _____________s are widely used for remote work, branch office connectivity, and securing data in transit.

A

Virtual Private Network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_____________ is a security feature that controls and manages access to websites based on predefined categories, URLs, or content types. Organizations implement _____________ to enforce web usage policies, block access to malicious or inappropriate websites, and reduce security risks associated with web browsing.

A

URL Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_____________ is a security measure that involves inspecting files and email attachments for known malware signatures and malicious behavior. By identifying and quarantining infected files, _____________ helps prevent the spread of viruses, trojans, and other malware within the network, reducing the risk of data breaches and system compromises.

A

Antivirus Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____________ is a security function that restricts access to web content based on predefined policies and criteria. It enables organizations to manage internet usage, control access to specific types of content (e.g., adult or gambling sites), and enforce compliance with acceptable use policies.

A

Content Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____________ is a security feature that allows organizations to identify, categorize, and control the use of specific applications or application categories on their networks. It enhances security by enabling administrators to enforce policies related to application access, bandwidth allocation, and productivity.

A

Application Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_____________ are access management techniques that associate network access permissions with specific user identities and roles within an organization. This fine-grained control ensures that users only access resources and data relevant to their roles, enhancing security and compliance.

A

User Identity and Role-Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_____________ is a critical aspect of network architecture and security that ensures uninterrupted system operation, even in the face of hardware or software failures. _____________ solutions typically involve redundant components, failover mechanisms, and load balancing to maintain continuous network access and minimize downtime.

A

High Availability (HA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_____________ involves the process of directing network traffic between different network segments or subnets. _____________, on the other hand, divides a network into isolated segments to enhance security, control, and performance. These techniques are fundamental to network design and security.

A

Routing and Network Segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_____________ is a networking technique that relies on routing protocols to automatically update routing tables based on network changes. It ensures efficient and adaptable routing in complex network environments, such as those found in large enterprises and service providers.

A

Dynamic Routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_____________ involves the generation and storage of detailed event and activity records for audit, analysis, and troubleshooting purposes. _____________ provides summarized and actionable insights based on logged data, facilitating security analysis and decision-making.

A

Logging and Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____________ are configuration settings that dictate how a firewall or security device should handle network traffic. These policies specify which traffic to allow, block, or inspect, based on various criteria such as source, destination, and service. They are crucial for defining the security posture of a network.

A

Security Policies and Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_____________ involves the incorporation of external threat data, such as indicators of compromise (IOCs) and threat feeds, into security systems. This integration enhances threat detection and response capabilities by providing timely and context-rich information about emerging threats and vulnerabilities.

A

Threat Intelligence Integration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____________ refers to the seamless integration of cloud services and resources with an organization’s existing network and security infrastructure. It enables organizations to extend their networks into the cloud, ensuring secure and efficient data flow between on-premises and cloud-based resources.

A

Cloud Integration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

_____________ provides a unified platform or console for configuring, monitoring, and managing multiple network security devices and services. It simplifies administrative tasks, enhances visibility, and streamlines security operations across the network.

A

Centralized Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

_____________ involve the use of scripts, programming, and automation tools to streamline network configuration, management, and monitoring tasks. They enable administrators to automate repetitive tasks, ensure consistency, and respond quickly to changing network conditions.

A

Scripting and Automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

_____________ is a security feature that enables the identification and control of specific applications within network traffic. It allows organizations to enforce policies related to application access and usage while optimizing network performance. What is the Acronym? _____________

A

Application Identification and Control (AppFW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

_____________ is a security function that restricts access to websites based on predefined categories, URLs, or content types. It is employed to enforce web usage policies, block malicious sites, and enhance web security.

A

Web Filtering (WebFW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

_____________ within security solutions scan files and email attachments for known malware signatures and malicious behavior. They play a crucial role in preventing malware infections by identifying and isolating infected files.

A

Antivirus (AV) features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

_____________ is an access management approach that assigns network access permissions based on user roles and responsibilities. It simplifies access control and helps organizations enforce the principle of least privilege.

A

User Role-Based Access Control (URBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

_____________ solutions provide secure remote access to network resources while adapting to changing network conditions. They offer flexibility and scalability in remote access scenarios.

A

Dynamic VPN (DVPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

_____________s establish secure connections between different network locations or sites. They are commonly used to connect branch offices, data centers, or remote sites securely.

A

Site-to-Site VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

_____________s provide secure remote access to resources via SSL encryption. They are often used for secure web-based access to applications and data.

A

SSL VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

_____________ is a security technique that involves executing potentially malicious files and programs in an isolated environment to observe their behavior and identify threats. Sky Advanced Threat Prevention (Sky ATP) is Juniper Networks’ cloud-based _____________ service, which offers comprehensive threat analysis and mitigation.

A

Sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

_____________ enable the creation of groups of applications for simplified policy management. They provide a flexible way to define security policies based on the characteristics and behavior of applications.

A

Dynamic Application Groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A _____________ provides advanced application-layer filtering and control, allowing organizations to protect against application-level threats. It offers deep inspection and control of application traffic.

A

Layer 7 Application Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

_____________ are configuration settings that dictate how a firewall or security device should handle network traffic. These policies specify which traffic to allow, block, or inspect, based on various criteria such as source, destination, and service. They are crucial for defining the security posture of a network.

A

Security Policies and Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

_____________ provide insights into application usage and performance on the network. They help organizations monitor and optimize their network resources.

A

Application Visibility and Reporting

31
Q

_____________ encompasses the use of threat intelligence data and feeds to proactively enhance security measures and response capabilities. It enables organizations to stay informed about emerging threats and vulnerabilities.

A

Security Intelligence

32
Q

_____________ is Juniper Networks’ cloud-based advanced threat prevention service. It leverages sandboxing and other techniques to detect and mitigate advanced threats, including zero-day malware.

A

Sky Advanced Threat Prevention (Sky ATP)

33
Q

_____________ is a security technique that involves the execution of potentially malicious files and programs in an isolated environment to observe their behavior and identify threats. It provides a controlled environment for analyzing suspicious files and preventing malware infections.

A

Sandboxing

34
Q

_____________ assess the reputation and trustworthiness of files and attachments based on known data and historical behavior. They help organizations make informed decisions about whether to allow or block files

A

File Reputation Services

35
Q

_____________ is a security feature that focuses on identifying and blocking threats at the application layer. It provides granular control over application traffic to protect against attacks and vulnerabilities.

A

Application Layer Threat Prevention

36
Q

_____________ involves inspecting files and email attachments for known malware signatures and malicious behavior. It plays a critical role in preventing malware infections and data breaches.

A

Anti-Malware Scanning

37
Q

_____________ is the process of thoroughly examining network traffic for signs of malicious activity or security threats. It involves analyzing packets and payloads to identify and mitigate potential risks.

A

Traffic Inspection

38
Q

Integration with _____________ systems allows security events and logs to be shared with a centralized platform for real-time analysis, correlation, and reporting. It enhances threat detection and incident response capabilities.

A

Security Information and Event Management (SIEM)

39
Q

An _____________ is a security solution that continuously monitors network traffic and system activities to identify suspicious patterns or behaviors that may indicate security threats. Unlike an Intrusion Prevention System (IPS), an _____________ primarily alerts administrators to potential threats rather than taking immediate automated actions.

A

Intrusion Detection System (IDS)

40
Q

_____________ is a method used by IDS and IPS systems to identify known threats by comparing network traffic against a database of known attack signatures. When a match is found, an alert is generated.

A

Signature-Based Detection

41
Q

_____________ is a detection method that looks for deviations from normal network behavior. It identifies abnormal patterns and behaviors that may indicate an intrusion or security threat, even if the threat is previously unknown (zero-day).

A

Anomaly-Based Detection

42
Q

_____________ allow administrators to create specific IDS/IPS rules tailored to their network environment. These rules can address unique threats and security requirements.

A

Custom Rule Sets

43
Q

IDS and IPS solutions generate _____________ to inform administrators about detected threats and security incidents. These _____________ provide details about the nature of the threat and help facilitate incident response.

A

Alert and Reports

44
Q

IDS and IPS solutions are often integrated with _____________ to enforce security rules and actions based on the detected threats. This integration allows for an immediate response to threats.

A

Firewall Policies

45
Q

_____________ refers to the level of precision and detail in security configurations. It allows administrators to define specific actions and responses for different threat scenarios, offering granular control over security policies.

A

Fine-Grained Control

46
Q

_____________ provides continuous visibility into network and security events as they occur. It enables security teams to respond quickly to threats and incidents.

A

Real-Time Monitoring

47
Q

_____________ involves aggregating and correlating security logs from various sources, including firewalls, IDS/IPS systems, and SIEM platforms. It provides a holistic view of security events and incidents.

A

Log Integration

48
Q

_____________ are external sources of threat data, such as known indicators of compromise (IOCs) and threat intelligence reports. These feeds enhance threat detection and response by providing up-to-date information about emerging threats.

A

Threat Intelligence Feeds

49
Q

_____________ is a network security framework that combines network security and wide-area networking (WAN) capabilities into a cloud-based service. It focuses on providing secure access to network resources for remote users and branch offices. What does the acronym mean? _____________

A

SASE (Secure Access Service Edge)

50
Q

_____________ are advanced firewall solutions that go beyond traditional stateful inspection to provide additional security features, including application control, intrusion prevention, and integration with threat intelligence.

A

Next-Generation Firewalls (NGFWs)

51
Q

_____________ encompasses the security measures and solutions used to protect data and resources hosted in public cloud environments. It includes access controls, encryption, and monitoring to ensure the confidentiality and integrity of cloud-hosted assets.

A

Public Cloud Security

52
Q

_____________ involves the identification of security threats and the subsequent actions taken to contain and mitigate those threats. It is a critical component of cybersecurity incident response.

A

Threat Detection & Mitigation

53
Q

_____________ is a Juniper Networks solution that provides centralized security management for Juniper firewall and security devices. It simplifies security policy management and monitoring.

A

Security Director

54
Q

_____________ is a security information and event management (SIEM) solution offered by Juniper Networks. It provides centralized log collection, analysis, and reporting for security events and incidents.

A

Secure Analytics SIEM

55
Q

_____________ encompasses a range of security technologies and strategies designed to protect against sophisticated and targeted cyber threats, including zero-day attacks and advanced persistent threats (APTs).

A

Advanced Threat Prevention

56
Q

_____________ refers to the use of threat intelligence data to enhance security measures and threat detection capabilities.

A

SecIntel (Security Intelligence)

57
Q

_____________ is a nonprofit organization focused on improving the security of software and web applications. It provides guidance and resources for addressing common web application security vulnerabilities.

A

OWASP (Open Web Application Security Project)

58
Q

_____________ is a security strategy that involves segmenting networks into small, isolated segments and implementing strict access controls based on the principle of “zero trust,” meaning trust is not assumed, and verification is required for all network traffic.

A

Zero Trust Micro-Segmentation

59
Q

_____________ are security vulnerabilities or exploits that are actively being exploited by attackers before a patch or fix is available. They pose a significant risk because there is no known defense against them.

A

Zero-Day Threats

60
Q

_____________ are cyberattacks that target vulnerabilities in a computer’s memory or RAM (Random Access Memory). These attacks can be challenging to detect and defend against because they occur in memory rather than on disk.

A

Memory-Based Attacks

61
Q

_____________ is a security solution designed to protect workloads and applications in cloud environments. It provides features such as intrusion prevention, antivirus, and threat intelligence integration for cloud-native security.

A

Juniper Cloud Workload Protection

62
Q

_____________ are security solutions that leverage cloud resources to collect, analyze, and disseminate information about emerging cyber threats and vulnerabilities. These services provide organizations with up-to-date threat data and actionable insights to enhance their security posture and protect against evolving threats. They often include threat feeds, malware analysis, and real-time threat intelligence updates, helping organizations stay ahead of cyber threats.

A

Cloud-Based Threat Intelligence Services

63
Q

_____________ refer to the ability of network infrastructure, such as firewalls, to seamlessly connect with and manage resources in cloud environments, such as public and private clouds. This capability allows organizations to extend their networks into the cloud while maintaining security and control. It involves configuring secure connections, often using VPNs or direct cloud integrations, to ensure seamless data flow between on-premises and cloud resources.

A

Cloud Connectivity and Integration

64
Q

_____________ are software-based firewall deployments that run as virtual machines (VMs) or containers. They provide network security and segmentation within virtualized or cloud environments, allowing organizations to protect their workloads and data in these environments. Virtual firewall instances are scalable and can adapt to dynamic cloud environments, providing security for cloud-native applications and services.

A

Virtual Firewall Instances

65
Q

_____________ encompass a range of sophisticated security features and tools designed to protect networks and data from advanced threats. These services often include intrusion detection and prevention, sandboxing, threat intelligence integration, and more. They go beyond traditional firewall capabilities to defend against evolving and sophisticated cyber threats.

A

Advanced Security Services

66
Q

_____________ enable secure and encrypted communication over untrusted networks, allowing remote users or branch offices to connect securely to the corporate network. They include site-to-site _____________ for connecting networks and remote access _____________ for connecting individual users. _____________ provide secure and authenticated access to network resources, ensuring data privacy and integrity.

A

VPN Services/VPN

67
Q

_____________ ensures uninterrupted operation by providing redundant components and failover mechanisms. _____________ refers to the ability to expand resources and capacity to handle increased network traffic or growth in the number of users or devices. Together, _____________ and _____________ ensure that network security and performance remain robust, even under high loads or in the event of hardware failures.

A

High Availability and Scalability

68
Q

A _____________ is a type of firewall that monitors the state of active connections and makes decisions on whether to allow or block traffic based on the context of the connection. It maintains a state table to track the state of network sessions. _____________ offer granular control and visibility into network traffic, helping organizations enforce security policies effectively.

A

Stateful Firewall

69
Q

_____________ is a network address translation (NAT) technique used in computer networking to map a specific private IP address to a corresponding public IP address. Unlike Dynamic NAT, which dynamically assigns public IP addresses from a pool, _____________ establishes a fixed, one-to-one mapping between a private IP address and a public IP address. This mapping is typically configured manually in the network device, such as a router or firewall.

A

Static Network Address Translation (Static NAT)

70
Q

_____________ is a method of network address translation (NAT) used in computer networking to map private IP addresses to public IP addresses dynamically. Unlike static NAT, where a one-to-one mapping between private and public IP addresses is configured manually, _____________ allows a pool of public IP addresses to be shared among multiple private devices.

A

Dynamic Network Address Translation (Dynamic NAT)

71
Q

_____________ is a network address translation (NAT) technique used in computer networking and firewall configurations to map multiple private IP addresses to a single public IP address. ____________ operates at the transport layer (Layer 4) of the OSI model and is also known as ____________. It is an extension of traditional NAT and is commonly used in home and business networks to conserve public IP addresses.

A

Port Address Translation (PAT) and Network Address Port Translation (NAPT)

72
Q

____________ is a comprehensive approach to security management that combines security information management (SIM) and security event management (SEM) into a single, integrated solution. ____________ systems collect and aggregate data from various sources within an organization’s IT infrastructure, including security appliances, servers, endpoints, and network devices. This data encompasses security-related events, logs, and other information.

A

Security Information and Event Management (SIEM)

73
Q

____________ is a comprehensive security management platform offered by Juniper Networks. It is designed to simplify and streamline the management of network security policies and devices, particularly in complex enterprise environments.

A

Juniper Security Director

74
Q

____________ is a centralized security management and configuration tool that provides network administrators with a unified interface to oversee and control security policies, devices, and threats across Juniper’s security product portfolio.

A

Juniper Security Director