Intrusion Prevention and Application Control Flashcards

1
Q

What does IPS do?

A
  • Flow-based detection blocking anomalies and exploits
  • Protects the inside of the network from outside threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What IPS action allows traffic and logs the activity?

A

Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does application control work?

A

Uses the IPS engine to scan traffic for application patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a limitation of HTTP block page for application control?

A

It can be used only for web applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In what situations might the default action for signatures be incorrect?

A
  • Software vendor releases a security patch (continuing to scan for exploits wastes resources)
  • Network has a custom application with traffic that inadvertently triggers an IPS signature
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are two ways you can add a predefined signature to an IPS sensor?

A
  • Select the signatures individually
  • Add a signature to a sensor using filters, FortiGate adds all signatures that match that filter
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are rate-based signatures used for?

A

To block traffic when the threshold is exceeded during a time period

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do rate-based signatures work?

A
  • Applied to protocols you use
  • FortiGate triggers the action when the threshold is reached during the configured “duration”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does the IPS compare traffic with the signatures in each filter?

A
  • The engine evaluates the filters and signatures at the top of the list first, and applies the first match
  • Skips subsequent filters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IPS action quarantine does what?

A

Allows you to quarantine the attacker’s IP address for a set duration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IPS action reset does what?

A

Generates a TCP RST packet whenever the signature is triggered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IPS action block does what?

A

Silently drops traffic matching any of the signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s a way to get consolidated botnet protection?

A

Enable botnet scanning on the IPS profile that you apply the firewall policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What SSL inspection mode should you use to get the maximum benefit from your IPS features?

A

Deep inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a way to troubleshoot continuous high-CPU use by the IPS engines?

A
  • diagnose test application ipsmonitor
  • Option 5 (IPS bypass mode)
  • If CPU decreases, it can indicate the volume of traffic being inspected is too high for that FortiGate model
  • If CPU remains high, it can indicate a problem in the IPS engine (report to Fortinet support)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does application control in FortiGate work?

A
  • Uses the IPS engine in flow-based scan
  • Detects and acts on network application traffic
17
Q

What does configuring network protocol enforcement on an application sensor allow you to do?

A

Configure network services on known ports, while blocking those services on other ports

18
Q

Having what enabled causes all HTTPS-based applications to provide a block page?

A

Deep inspection

19
Q

In what order does FortiGate scan the application profile?

A
  • Application and filter overrides
  • Categories
20
Q

Does application control profile scan or web filtering scan happen first?

A

Application control

21
Q

How do you enable an application control profile you configured?

A

Enable application control and select the profile in the appropriate firewall policy

22
Q

Which IPS action allows traffic and logs the activity?

A

Monitor

23
Q

What uses the IPS engine to scan traffic for application patterns?

A

Application control

24
Q

What can the HTTP block page be applied to?

A

Web applications