Module 6 Creating and Managing Security Policy Rules Flashcards

1
Q

What are the predefined security policy rules

A

Intrazone traffic and interzone traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the diff between interzone and intrazone traffic.

A

No traffic by default allowed between zones (interzone), but traffic allow to move freely within a zone (intrazone)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

If you want to modify an existing predefine rule, what do you need to select and click?

A

Override button.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three policy rule types?

A

Universal, intrazone, and interzone (traffic goes freely between zones, but not within its own zone**).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

By default, is traffic allowed between zones?

A

By default, firewall IMPLICITLY allows intrazone (traffic within a zone), but not between zones (interzone).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

By default, do predefined security policy rules log traffic?

A

No, they do not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens if you place an explicit deny all rule in front of the two predefined implicit rules?

A

It will deny intrazone traffic! This is no good

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Are rules evaluated top to bottom?

A

Yes they are, once it finds a match, further rules are not evaluated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Are policy rules unidirectional?

A

Yes, it goes one way. Policy rules allow traffic that is initiated in the direction that the security policy rules specifies: source zone to destination zone. It also allows the replies back.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is rule shadowing?

A

Traffic can match multiple rules, this sheds light on this fact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the rule changes archive?

A

To meet regulatory compliance, you can track all audit comments in the audit comment archive under General Tab when constructing a policy rule.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BLDG a policy rule - under Source Tab, there are 5 categories for source user.

A

Any, pre-logon, known-user, unknown, select

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a known user?

A

All authenticated users, any IP address with a username mapped by User-ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an unknown user?

A

All unauthenticated users, IP addresses not mapped to a user by User-ID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a pre-logon?

A

Remote users connected to network using GlobalProtect, but are not logged into their system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is any?>

A

Any type of use

17
Q

What is select?

A

Select users or groups that have been added using the Add link.

18
Q

What is the default for the destination and source Zone?

A

Any

19
Q

Can the commit function determine if there are app dependencies?

A

Yes it can, unresolved dependencies are reported.

20
Q

Action tab is second to last tab - so, there are 6 action tabs, what are they?

A

Allow, deny, drop, reset client, reset server, reset both client and server

21
Q

What is the allow tab?

A

Default

22
Q

What is the deny tab?

A

Blocks traffic

23
Q

What is the drop tab?

A

Silently drops the traffic. TCP reset not sent to client or server.

24
Q

What is the reset both client and server?

A

Sends TCP reset to both client and server.

25
Q

What is the reset server tab?

A

Sends TCP reset to the server.

26
Q

What is the reset client tab?

A

Sends TCP reset to the client?

27
Q

What is an add object?

A

Name-value pair that can represent a single IP address, a range of IP addresses, an IP subnet or the FQDN.

28
Q

If you create a static Address Group, will that require a commit?

A

Yes

29
Q

What is a dynamic address group?

A

Tagged IP addresses automatically added to group. NO COMMIT necessary. TAG the group, firewall auto-tagging or external software.

30
Q
A