Network Security Fundamentals Flashcards
(90 cards)
What is the foundation of the PAN security portfolio?
NGFW
How is the firewall available?
Physical
Virtual
Cloud Delivered
What are the subscription services available?
TP - Threat Prevention
UF - URL Filtering
DNS - DNS Security
WF - Wildfire malware prevention
What provides centrailized network security management?
Panorama
The next-generation firewall functions as a ____________ in a Zero Trust architecture.
Segmentation Gateway
Single-Pass Architecture
a unique integration of software and hardware that simplifies management, streamlines processing, and maximizes performance.
Stream based Engine vs File Proxies
file proxies need to download the entire file before they can scan the traffic
a stream-based engine scans traffic in real time, only reassembling packets as needed and only in very small amounts.
The foundational element of our enterprise security platform is
identification
Goals of IAM
- Compliance
- Least Privilege
- Protect Data and Systems
PoLP
Principle of Least Privilege
ABAC
Attribute-based access control
a way to provide and manage user access to IT
services to support areas that require more contextual awareness than simple user-focused
parameters as an assigned role
DAC
Discretionary Access Control
The app owner has complete control over who can access a particular service. An application can be a file, directory, or any other, which can be
accessed via the network. Can grant permission to other users to access the app.
MAC
Mandatory Access Control
a restrictive type of access control. In MAC, access to resources is controlled by a security policy that is enforced by the operating system. MAC is more secure than DAC, but it is also more difficult to implement and manage.
__________ a standard feature on Palo Alto Networks next-generation firewalls, enables you to leverage user information stored in a wide range of repositories.
User-ID
______ accurately identifies applications regardless of port, protocol, evasive techniques, or encryption. It provides application visibility and granular, policy-based control.
App-ID
What is the first step in application identification?
Establishing Port and Protocol information
What are the advantages of using App-ID?
Granular Control
Visibility
Postitive Enforcement
What are the advantages of User-ID?
Visibilty
Policy Control
Logging and Reporting
________ controls traffic based on complete analysis of all allowed traffic. It uses multiple threat prevention and data loss prevention techniques in a single-pass architecture that fully integrates all security functions.
Content Identification (Content-ID)
Application Decoders
enables the firewall to detect and prevent threats tunneled within approved applications that would bypass traditional IPS or proxy solutions.
Uniform Threat Signature Format
uniform threat engine and signature format to detect and block a wide range of malware C2 activity and vulnerability exploits in a single pass.
Vulnerability Attack Protection (IPS)
Robust routines for traffic normalization and defragmentation, boosted by protocol-anomaly, behavior-anomaly, and heuristic detection mechanisms, provide protection from the widest range of both known and unknown threats.
PA-Series Firewalls Use cases
Data center and remote branch deployments
_______ Series M-Powered NGFWs ensure top-notch security for high-speed data centers and service providers. These ML-powered systems deliver dependable performance, robust threat prevention, and high-throughput decryption capabilities.
PA-7000