Network Security Fundamentals Flashcards

(90 cards)

1
Q

What is the foundation of the PAN security portfolio?

A

NGFW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is the firewall available?

A

Physical
Virtual
Cloud Delivered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the subscription services available?

A

TP - Threat Prevention

UF - URL Filtering

DNS - DNS Security

WF - Wildfire malware prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What provides centrailized network security management?

A

Panorama

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The next-generation firewall functions as a ____________ in a Zero Trust architecture.

A

Segmentation Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Single-Pass Architecture

A

a unique integration of software and hardware that simplifies management, streamlines processing, and maximizes performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Stream based Engine vs File Proxies

A

file proxies need to download the entire file before they can scan the traffic

a stream-based engine scans traffic in real time, only reassembling packets as needed and only in very small amounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The foundational element of our enterprise security platform is

A

identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Goals of IAM

A
  1. Compliance
  2. Least Privilege
  3. Protect Data and Systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PoLP

A

Principle of Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ABAC

A

Attribute-based access control

a way to provide and manage user access to IT

services to support areas that require more contextual awareness than simple user-focused

parameters as an assigned role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DAC

A

Discretionary Access Control

The app owner has complete control over who can access a particular service. An application can be a file, directory, or any other, which can be

accessed via the network. Can grant permission to other users to access the app.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MAC

A

Mandatory Access Control

a restrictive type of access control. In MAC, access to resources is controlled by a security policy that is enforced by the operating system. MAC is more secure than DAC, but it is also more difficult to implement and manage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

__________ a standard feature on Palo Alto Networks next-generation firewalls, enables you to leverage user information stored in a wide range of repositories.

A

User-ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

______ accurately identifies applications regardless of port, protocol, evasive techniques, or encryption. It provides application visibility and granular, policy-based control.

A

App-ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the first step in application identification?

A

Establishing Port and Protocol information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the advantages of using App-ID?

A

Granular Control
Visibility
Postitive Enforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the advantages of User-ID?

A

Visibilty
Policy Control
Logging and Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

________ controls traffic based on complete analysis of all allowed traffic. It uses multiple threat prevention and data loss prevention techniques in a single-pass architecture that fully integrates all security functions.

A

Content Identification (Content-ID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Application Decoders

A

enables the firewall to detect and prevent threats tunneled within approved applications that would bypass traditional IPS or proxy solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Uniform Threat Signature Format

A

uniform threat engine and signature format to detect and block a wide range of malware C2 activity and vulnerability exploits in a single pass.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Vulnerability Attack Protection (IPS)

A

Robust routines for traffic normalization and defragmentation, boosted by protocol-anomaly, behavior-anomaly, and heuristic detection mechanisms, provide protection from the widest range of both known and unknown threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

PA-Series Firewalls Use cases

A

Data center and remote branch deployments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

_______ Series M-Powered NGFWs ensure top-notch security for high-speed data centers and service providers. These ML-powered systems deliver dependable performance, robust threat prevention, and high-throughput decryption capabilities.

A

PA-7000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
----------Series next-generation firewall is crafted to fulfill the demanding necessities of hyperscale data centers, internet edges, and campus segmentation implementations. The ________ boasts remarkable performance, providing 150Gbps of threat protection with security services activated.
PA-5450
26
_______Series effectively halts both known and zero-day attacks across all network traffic, including encrypted data. These potent ML-Powered NGFWs are ideally suited for securing high-speed internet edge, data center, and extensive campus segmentation scenarios.
PA-5400
27
______ Series boasts impressive performance in a compact 1RU design. As an energy-efficient ML-powered NGFW, it serves as the preferred firewall for internet edge and campus settings.
PA-3400
28
______ Series is perfect for safeguarding expansive branch locations and smaller enterprise campuses. It supports Power over Ethernet (PoE), virtual systems (VSYS), high-speed 5G copper ports (mGig ports), and fiber ports, making it an ideal choice for comprehensive protection.
PA-1400
29
______ offers inline, real-time threat protection for enterprise branches. With its compact design, this fourth-generation series delivers enterprise-level security that is easy to implement. These ML-powered NGFWs effectively prevent both known and unknown threats in real time while swiftly decrypting branch traffic.
PA-400
30
______ is a durable ML-Powered NGFW designed to provide strong security in challenging conditions. Common applications include utility substations, power plants, manufacturing facilities, oil and gas installations, and building management systems.
PA-220R
31
________ firewall provides threat protection for inbound, outbound, and east-west traffic between container trust zones and other workload types without slowing the speed of development.
CN-Series
32
Palo Alto Networks CN-Series next-generation firewalls deploy as two sets of pods
CN-MGMT (Management) CN-NGFW (Firewall Dataplace)
33
The dataplane pods can be deployed in two modes: (and define)
Distributed - In distributed mode, the firewall dataplane runs as a daemon set on each node. CLustered MOde - the firewall dataplane runs as a Kubernetes service in a dedicated security node.
34
_________ firewalls are 5G-ready next-generation firewalls designed to prevent successful cyberattacks from targeting mobile network services. The _______ firewalls are designed to handle growing throughput needs due to increased application,user, and device-generated data.
K2-Series
35
Advantages of K2-Series FWs
Scalable Secure and Fast
36
________ is a set of day-one, next-generation firewall configuration templates for PAN-OS that are based on security best practice recommendations.
IronSkillet
37
IronSkillet Benefits
Faster time to implement Fewer configuration errors Improved security posture
38
__________ enables organizations to analyze their existing environment, convert existing Security policies to Palo Alto Networks Next-Generation Firewalls, and assist with the transition from proof of concept to production.
PAN Expedition Migration Tool
39
______ transfers the various firewall rules, addresses, and service objects to a PAN-OS XML configuration file that can be imported into a Palo Alto Networks next-generation firewall.
Third-Party Migration
40
______ a free tool used to quickly identify the most critical security controls for an organization to focus on.
PAN Best Practice Assessment (BPA)
41
List the parts of a BPA
1. Best Practice Assessment 2. Security Policy Capability Adoption Heatmap 3. BPA Executive Summary
42
ZTNA Implementation Steps.
1. Define your protect surface 2. Map the transaction flows 3. Architect the ZTNA 4. Create the ZT Policy 5. Monitor and maintain the network
43
Types of Subscription Services
IoT Security Services SD-Wan Service DNS Security SErvice URL Filtering Service Advanced URL Filtering Service
44
URL Filtering database
PAN-DB
45
________ is a cyberthreat prevention service that identifies unknown malware, zero-day exploits, and advanced persistent threats (APTs) through static and dynamic analysis in a scalable, virtual environment.
Wildfire Cloud based malware analysis environment
46
_______ is included as part of the Threat Prevention license.
Basic Wildfire Support
47
Wildfire Verdicts
Bengin - Safe Grayware - No risk, but odd behavior Malware - pose security threat Phishing - attempt to trick
48
What happen is Wildfire has never seen the file?
Submits the file for analysis.
49
Provides a graphical analysis of firewall traffic logs and identifies potential risks to your network using threat intelligence from the Threat Intel Management portal.
Cortex XSOAR TIM
50
Provides cloud-based, centralized log storage and aggregation. The _________ is required or highly-recommended to support several other cloud-delivered services, including Cortex XDR, IoT Security, and Prisma Access, and Traps management service.
Cortex Data Lake
51
Provides mobility solutions and/or large-scale VPN capabilities.
Global Protect Gateway
52
Provides cloud-based protection against unauthorized access, misuse, extraction, and sharing of sensitive information.
Enterprise DLP
53
works with Cortex Data Lake to discover all of the SaaS applications in use on your network.
SaaS Security Inline
54
______ enables you to manage all key features of Palo Alto Networks Next-Generation Firewalls by using a model that provides central oversight and local control.
Panorama
55
Deployment Modes for Panorama
Panorama Mode Management Only Mode Log Collector Mode
56
Why separate management and log collection modes on Panorama?
enables Panorama to scale to meet organizational and geographical requirements.
57
Panorama Mode
Panorama mode controls both policy and log management functions for all managed devices.
58
Management Only
In management only mode, Panorama manages configurations for managed devices but does not collect or manage logs.
59
Log Collector Mode
In log collector mode, one or more log collectors collect and manage logs from managed devices. This assumes that another deployment of Panorama is operating in management only mode.
60
Panorama manages common policies and objects through _______
hierarchical device groups
61
Which step of implementing a Zero Trust model includes scanning and mapping the transaction flows inside your network to determine how various data, applications, assets, and service components interact with other resources on your network?
Map the transaction flows
62
Which next-generation firewall deployment option prevents successful cyberattacks from targeting mobile network services?
K2
63
Which WildFire verdict is given for a submission that is malicious in nature and intent and can pose security threats?
Malware
64
Which PAN-OS Next-Generation Firewall configuration templates are based on security best practice recommendations instead of extensive how-to documentation?
IronSkillet
65
Which option shows the three deployment mode options available for Panorama, which (if necessary) allows for the separation of management and log collection?
Panorama Managment ONly Log Collector
66
Role-Based Access Control (RBAC) is part of which area of Strata protection?
IAM
67
Which Palo Alto Networks product provides all the capabilities of next-generation hardware firewalls in a virtual machine form?
VM-Series
68
Which Palo Alto Networks product is a free tool used to identify the most critical security controls for an organisation to focus on?
BPA (Best Practice Assessment
69
_____ provides access and security for all users and apps while providing protection against all threat vectors, not just web-based apps and threats.
Prisma SASE
70
3 Key Pillars of Prisma SASE
1. Security aaS 2. Network aaS 3. Digital Experience aaS
71
______ is Palo Alto Networks cloud-delivered security platform that seamlessly connects and secures any user, from any device, accessing any app.
Prisma Access
72
_____ as part of the SASE solution to not only provide a great experience but also deliver segment-wise insights with auto-remediation so IT can scale to alleviate the tension between security and usability.
Autonomous Digital Experience Management (ADEM)
73
PAN's SASE SD-Wan Solution
Prisma SD-WAN
74
______ can either be on-premises or cloud-based services that provide security policy enforcement points between those who use or consume the cloud service from those who provide the cloud services.
Cloud Access Security Broker (CASBs)
75
______ capabilities of Prisma Access are stateful and continuously gathers information about the TCP session, the application handshakes, the application behavior, the stateful protocols, and more.
App-ID
76
_____ provide deep packet inspections that are beyond legacy port and protocol inspections and/or blocking to add an application inspection.
NGFW
77
Issse with MPLS?
Expensive
78
Issue with IPSec
Often adds unnecessary latency
79
GlobalProtect app update.
Prisma Access updates the app 7-10 after GA
80
Antivirus Protection Update
Every hour, 10 minutes after the hour
81
Wildfire Update
Every 15 minutes
82
GLobal PRotect data file update
every hour
83
Clientless VPN application signatures update
Every hour
84
Node that provide connectivity to the data center.
SC-CAN Corporate access node
85
Node for when mobile users are onboarded
MU-SPNs Security processing node
86
Node for When remote networks are onboarded,
RN-SPNs Remote Network Security Processing Nodes
87
The Palo Alto Networks Prisma SASE solution is architectured around which three key pillars? (Choose three.)
Security aaS Network aaS ADEM
88
Which three are components of Prisma SASE? (Choose three.)
SDWAN CASB ZTNA
89
What does Palo Alto Networks provide as a SD-WAN solution that also includes a secure web gateway?
Prisma SD WAN
90
Which three are considered problems for a traditional security approach for remote networks and mobile users? (Choose three.)