Lecture 3 pt 1. Flashcards

1
Q

What is NIST? What are the benefits of its approach?

A

It’s a layered approach to security. If an attacker breaks through one layer, there are more layers protecting the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Can you have redundancy with standalone installations?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Can you have automatic failover with standalone firewalls?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Checkpoint provide over Fortinet?

A

Application Control
Identity-Based Security Policies
Centralized Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name the 4 things we track to monitor NGFW performance

A

Throughput
Latency
Session Counts
CPU and Memory Usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name this: Measures the amount of data the firewall can process within a given time frame

A

Throughput

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name this: The time it takes for a packet to pass through the firewall

A

Latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name this: This can affect the performance of time-sensitive applications

A

Latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name this: We monitor this to ensure the firewall is not overwhelmed

A

Session Counts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do the session counts tell us?

A

The number of concurrent sessions the firewall is handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

We also monitor the CPU and Memory usage for the firewall. What can High usage indicate?

A

The firewall is under stress and may become a bottleneck

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name 3 important things when managing NGFW policies for complex enterprise environments

A
  1. Centralized Management
  2. Segmentation
  3. Compliance checks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name this important thing for managing a NGFW:
Provides a unified view and control over firewall rules across the entire network

A

Centralized Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name this important thing for managing a NGFW:
Divide the network into domains/segments to increase security and reduce complexity

A

Segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name this important thing for managing a NGFW:
Regularly ensure that the firewall policies and security configurations adhere to industry regulations, legal requirements, and internal security policies

A

Compliance checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Separating _______ ________ (security gateways) from ___________ functions (policy control, logging, and monitoring) increases performance, _________, and scalability

A

firewall functions; management; isolation

17
Q

T/F - By default, all Palo Alto interface come in Tap deployment mode

A

False, by default they all come in Virtual Wire mode

18
Q

Name this: when in this mode, Palo Alto supports decryption, app-identification, content-identification, user-identification, and NAT

A

Virtual Wire mode

19
Q

Name the 4 deployment modes of Palo Alto

A

Tap, Virtual Wire, Layer 2, Layer 3

20
Q

T/F - Layer 2 deployment allows the configuration of multiple interfaces