Insider Threats Prevention Flashcards

1
Q

Juniper Firewalls enforce strict authentication and access control policies. They ensure that only authorized users have access to specific network resources and data. This helps prevent insider threats by limiting access to sensitive information.

A

Authentication and Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Some Juniper Firewall solutions incorporate UEBA capabilities to monitor user and entity behavior. They can detect deviations from normal behavior patterns and raise alerts if a user exhibits suspicious activities, such as accessing unauthorized resources.

A

User and Entity Behavior Analytics (UEBA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Juniper Firewalls equipped with DLP features can inspect outbound traffic for sensitive data. They can prevent users from sending confidential information outside the network, reducing the risk of insider threats attempting data exfiltration.

A

Data Loss Prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IDS/IPS capabilities in Juniper Firewalls can detect and block suspicious activities within the network. They can identify patterns of behavior that might indicate an insider threat, such as unauthorized access or data transfer.

A

Intrusion Detection/Prevention System (IDS/IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Juniper Firewalls can maintain detailed access logs and audit trails. This enables administrators to review and monitor user activities, helping to identify and investigate insider threats.

A

Access Auditing and Logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly