SRX Flashcards

1
Q

___________ in the context of a Juniper firewall refers to the administration and control of network devices, including firewalls, routers, and switches. “___________” in this context specifically pertain to the network appliances and equipment that are part of your network infrastructure. ___________ involves tasks like device provisioning, configuration, monitoring, and maintenance. It allows administrators to ensure the proper functioning of these devices, maintain their security, and optimize their performance.

A

Device Management-Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___________ in the realm of Device Management for Juniper firewalls are predefined templates that simplify the process of configuring network devices. These templates provide a standardized, efficient, and error-free way to configure multiple devices with consistent settings. Configuration templates typically include settings for interfaces, security policies, routing, and other device-specific parameters, ensuring that devices are set up according to best practices and security policies.

A

Device Management-Configuration Templates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Images, in the context of Device Management for Juniper firewalls, refer to the firmware or software versions that run on the network devices. These images contain the operating system and associated software that enable the device to function. Managing images involves tasks like upgrading, patching, and ensuring that the device’s software is up to date to maintain security and performance.

A

Device Management-Images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___________ are sets of software components that enhance the security features and capabilities of Juniper firewalls. These packages may include intrusion detection and prevention (IPS/IDP), antivirus, anti-malware, and other security services. Managing ___________ involves tasks like updating, configuring, and fine-tuning these components to protect the network from threats and vulnerabilities.

A

Device Management-Security Packages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___________ refers to the security policies defined on Juniper’s SRX series firewalls. These policies determine the rules and actions that dictate how traffic is allowed or denied within the network. ___________ typically include rules for firewall filtering, NAT (Network Address Translation), security zones, and more, allowing administrators to control the flow of traffic and secure the network.

A

SRX Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The ___________ is a graphical representation of the security policies applied to a specific Juniper SRX firewall device. It provides a visual overview of the configured policies, allowing administrators to easily understand how traffic is managed on that particular device. ___________ aids in troubleshooting and optimizing security policies for a specific SRX firewall.

A

SRX Policy-Device View / Device View

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Intrusion Prevention System (IPS) is a ___________ service that helps protect the network against malicious activities and attacks. It inspects network traffic for known attack patterns and vulnerabilities, and when it detects a threat, it can block, log, or alert on the malicious activity, helping to safeguard the network from potential breaches.

A

Security Subscriptions-IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___________ subscriptions enhance the firewall’s ability to filter and control web content and applications. This includes features like URL filtering, application control, and antivirus scanning to protect against malicious web content, block unauthorized applications, and ensure that users adhere to company policies while browsing the internet.

A

Security Subscriptions-Content Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___________ are used to inspect and decrypt encrypted traffic, such as HTTPS, in order to analyze it for security threats. These profiles are part of SSL/TLS decryption mechanisms and help the firewall inspect and apply security policies to encrypted traffic while maintaining privacy and compliance.

A

Security Subscriptions-Decrypt Profiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___________ is a subscription service that provides real-time threat intelligence feeds. It helps the firewall make informed decisions by dynamically updating threat intelligence and taking action against emerging threats, improving the network’s security posture.

A

Security Subscriptions-Security Intelligence (SecIntel)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The ___________ subscription is a service that scans traffic for malware and viruses. It identifies and blocks or quarantines files and attachments that contain malicious code, reducing the risk of malware infections on the network.

A

Security Subscriptions-Anti-Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

___________ is a subscription service that allows the firewall to act as an intermediary for web traffic. It filters web content, enforces web usage policies, and provides additional security by inspecting and controlling web traffic before it reaches its destination.

A

Security Subscriptions-Secure Web Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

___________ is a secure communication protocol used to establish encrypted and authenticated connections between two or more network endpoints. This technology is often used to create secure tunnels over the internet or other untrusted networks, ensuring the confidentiality and integrity of data during transmission.

A

IPsec (Internet Protocol Security) VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

___________ in the context of IPsec VPNs are configuration templates that define the parameters for establishing VPN connections. These profiles specify the encryption, authentication, and other settings required for the VPN, making it easier to create consistent and secure VPN connections.

A

IPsec VPN-VPN Profiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

___________ are network devices or endpoints outside the local network that need to connect to the network via an IPsec VPN. These devices could be remote offices, partners, or clients who require secure access to specific resources on the network.

A

IPsec VPN-Extranet Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network Address Translation (NAT) policies define the rules for translating IP addresses and ports as traffic passes through the firewall. NAT policies control how internal private IP addresses are mapped to external public IP addresses, allowing multiple internal devices to share a single public IP address.

A

NAT- Network Address Translation (NAT) Policies

17
Q

___________ are sets of public IP addresses that can be dynamically assigned to internal devices as part of the Network Address Translation process. These pools help in distributing and managing the allocation of public IP addresses to internal hosts.

A

NAT- NAT Pools

18
Q

___________ is a Juniper-specific solution for managing and controlling user identities and access within the network. It provides features like user authentication, authorization, and accounting, helping administrators define and enforce access policies.

A

Identity-JIMS (Juniper Identity Management Service)

19
Q

___________ is a Microsoft technology that serves as a directory service and user authentication platform. In the context of Juniper firewall, Active Directory integration allows for centralized user authentication and access control, simplifying user management and improving security.

A

Identity-Active Directory

20
Q

An ___________ is a configuration setting on a Juniper firewall that defines the access permissions and policies for users or user groups. These profiles help determine what network resources and services users can access and under what conditions.

A

Identity-Access Profile

21
Q

___________ are sets of IP addresses that can be assigned to users or devices during the authentication and connection process. In the context of Juniper firewall and identity management, address pools are used to allocate IP addresses to users as they connect to the network, ensuring proper IP management and security.

A

Identity-Address Pools