USB-based Attacks Prevention Flashcards

1
Q

Juniper Firewalls can implement device control policies that restrict or monitor the use of USB devices within the network. They can block or alert on unauthorized USB device connections.

A

Device Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Juniper Firewalls can enforce access control policies that limit USB device connections to specific trusted devices or ports. They can block connections from unapproved USB devices.

A

Access Control Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Juniper Firewalls with behavior-based analysis can monitor USB device behavior for unusual activities. They can detect and alert on suspicious USB device actions.

A

Behavior-Based Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Juniper Firewalls can inspect USB device content for malicious files or scripts. They can block or quarantine files that pose a threat when introduced via USB.

A

Content Inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Juniper Firewalls can enforce port security policies that control which devices are allowed to connect to specific USB ports. They can block unauthorized connections.

A

Port Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly