Rogue Devices Prevetion Flashcards

1
Q

Juniper Firewalls equipped with NAC features can enforce strict network access policies. They can authenticate and authorize devices before granting access to the network. Rogue devices that do not meet the security requirements are denied access.

A

Network Access Control (NAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Juniper Firewalls can implement port security measures to restrict the number and type of devices that can connect to specific network ports. Unauthorized devices attempting to connect are blocked or restricted.

A

Port Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Juniper Firewalls can employ MAC address filtering to allow or deny devices based on their unique MAC addresses. Rogue devices not listed in the approved MAC address list are prevented from connecting.

A

MAC Address Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IDS/IPS capabilities in Juniper Firewalls can detect and alert on unusual or suspicious network activities, including the presence of rogue devices. They can identify unauthorized devices attempting to access the network and trigger alerts for further investigation.

A

Intrusion Detection/Prevention System (IDS/IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Juniper Firewalls equipped with WIDS capabilities can monitor wireless networks for rogue access points and unauthorized devices. They can detect and mitigate the risks associated with rogue wireless devices.

A

Wireless Intrusion Detection System (WIDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly