Juniper Firewall Terms Flashcards
An _____________ is a critical component of network security that continuously monitors network traffic and system activities to identify and mitigate security threats. It goes beyond intrusion detection by taking immediate, automated actions to block or prevent known and emerging threats from compromising the network. _____________ solutions utilize a combination of signature-based detection, anomaly detection, and heuristics to identify suspicious behavior and stop malicious activity in real-time. These systems play a crucial role in protecting networks and data by actively defending against a wide range of cyberattacks, including malware, exploits, and intrusion attempts.
Intrusion Prevention System (IPS)
_____________ are specialized components within firewall or security devices designed to understand and manage specific application-layer protocols. _____________ provide deep packet inspection and context-aware filtering for applications like SIP, FTP, and H.323, ensuring that traffic adheres to protocol-specific security and compliance requirements. By inspecting and controlling application-specific data, _____________ enhance security and the proper functioning of applications within the network.
Application Layer Gateways (ALGs)
_____________ is a fundamental networking technique used in firewalls and routers to modify source or destination IP addresses in packet headers as they traverse the device. _____________ allows multiple devices in a private network to share a single public IP address, thereby providing security and conserving public IP address space.
Network Address Translation (NAT)
A _____________ is a secure communication method that enables users or networks to establish encrypted connections over untrusted networks, such as the internet. _____________s provide data confidentiality, integrity, and authentication. They include several types, such as site-to-site _____________s for connecting entire networks, remote access _____________s for individual users, and SSL _____________s for secure web-based access to resources. _____________s are widely used for remote work, branch office connectivity, and securing data in transit.
Virtual Private Network (VPN)
_____________ is a security feature that controls and manages access to websites based on predefined categories, URLs, or content types. Organizations implement _____________ to enforce web usage policies, block access to malicious or inappropriate websites, and reduce security risks associated with web browsing.
URL Filtering
_____________ is a security measure that involves inspecting files and email attachments for known malware signatures and malicious behavior. By identifying and quarantining infected files, _____________ helps prevent the spread of viruses, trojans, and other malware within the network, reducing the risk of data breaches and system compromises.
Antivirus Scanning
_____________ is a security function that restricts access to web content based on predefined policies and criteria. It enables organizations to manage internet usage, control access to specific types of content (e.g., adult or gambling sites), and enforce compliance with acceptable use policies.
Content Filtering
_____________ is a security feature that allows organizations to identify, categorize, and control the use of specific applications or application categories on their networks. It enhances security by enabling administrators to enforce policies related to application access, bandwidth allocation, and productivity.
Application Control
_____________ are access management techniques that associate network access permissions with specific user identities and roles within an organization. This fine-grained control ensures that users only access resources and data relevant to their roles, enhancing security and compliance.
User Identity and Role-Based Access Control
_____________ is a critical aspect of network architecture and security that ensures uninterrupted system operation, even in the face of hardware or software failures. _____________ solutions typically involve redundant components, failover mechanisms, and load balancing to maintain continuous network access and minimize downtime.
High Availability (HA)
_____________ involves the process of directing network traffic between different network segments or subnets. _____________, on the other hand, divides a network into isolated segments to enhance security, control, and performance. These techniques are fundamental to network design and security.
Routing and Network Segmentation
_____________ is a networking technique that relies on routing protocols to automatically update routing tables based on network changes. It ensures efficient and adaptable routing in complex network environments, such as those found in large enterprises and service providers.
Dynamic Routing
_____________ involves the generation and storage of detailed event and activity records for audit, analysis, and troubleshooting purposes. _____________ provides summarized and actionable insights based on logged data, facilitating security analysis and decision-making.
Logging and Reporting
_____________ are configuration settings that dictate how a firewall or security device should handle network traffic. These policies specify which traffic to allow, block, or inspect, based on various criteria such as source, destination, and service. They are crucial for defining the security posture of a network.
Security Policies and Rules
_____________ involves the incorporation of external threat data, such as indicators of compromise (IOCs) and threat feeds, into security systems. This integration enhances threat detection and response capabilities by providing timely and context-rich information about emerging threats and vulnerabilities.
Threat Intelligence Integration
_____________ refers to the seamless integration of cloud services and resources with an organization’s existing network and security infrastructure. It enables organizations to extend their networks into the cloud, ensuring secure and efficient data flow between on-premises and cloud-based resources.
Cloud Integration
_____________ provides a unified platform or console for configuring, monitoring, and managing multiple network security devices and services. It simplifies administrative tasks, enhances visibility, and streamlines security operations across the network.
Centralized Management
_____________ involve the use of scripts, programming, and automation tools to streamline network configuration, management, and monitoring tasks. They enable administrators to automate repetitive tasks, ensure consistency, and respond quickly to changing network conditions.
Scripting and Automation
_____________ is a security feature that enables the identification and control of specific applications within network traffic. It allows organizations to enforce policies related to application access and usage while optimizing network performance. What is the Acronym? _____________
Application Identification and Control (AppFW)
_____________ is a security function that restricts access to websites based on predefined categories, URLs, or content types. It is employed to enforce web usage policies, block malicious sites, and enhance web security.
Web Filtering (WebFW)
_____________ within security solutions scan files and email attachments for known malware signatures and malicious behavior. They play a crucial role in preventing malware infections by identifying and isolating infected files.
Antivirus (AV) features
_____________ is an access management approach that assigns network access permissions based on user roles and responsibilities. It simplifies access control and helps organizations enforce the principle of least privilege.
User Role-Based Access Control (URBAC)
_____________ solutions provide secure remote access to network resources while adapting to changing network conditions. They offer flexibility and scalability in remote access scenarios.
Dynamic VPN (DVPN)
_____________s establish secure connections between different network locations or sites. They are commonly used to connect branch offices, data centers, or remote sites securely.
Site-to-Site VPN
_____________s provide secure remote access to resources via SSL encryption. They are often used for secure web-based access to applications and data.
SSL VPN
_____________ is a security technique that involves executing potentially malicious files and programs in an isolated environment to observe their behavior and identify threats. Sky Advanced Threat Prevention (Sky ATP) is Juniper Networks’ cloud-based _____________ service, which offers comprehensive threat analysis and mitigation.
Sandboxing
_____________ enable the creation of groups of applications for simplified policy management. They provide a flexible way to define security policies based on the characteristics and behavior of applications.
Dynamic Application Groups
A _____________ provides advanced application-layer filtering and control, allowing organizations to protect against application-level threats. It offers deep inspection and control of application traffic.
Layer 7 Application Firewall
_____________ are configuration settings that dictate how a firewall or security device should handle network traffic. These policies specify which traffic to allow, block, or inspect, based on various criteria such as source, destination, and service. They are crucial for defining the security posture of a network.
Security Policies and Rules