Term
| What are the five steps to a Zero Trust Network |
|
Definition
1. Define your protect surface
2. Map the transaction flows
3. Architect a Zero Trust Network
4. Create the Zero Trust policy
5. Monitor and maintain the network |
|
|
Term
|
Definition
|
|
Term
|
Definition
| protected health information |
|
|
Term
|
Definition
| personally identifiable information |
|
|
Term
|
Definition
|
|
Term
|
Definition
| data, application, assets or services |
|
|
Term
| What is a well-defined set of rules that include the following: subjects, objects, actions, permissions & protections. |
|
Definition
|
|
Term
| What is an abstraction that provides a conceptual language for administrators to specify security policies |
|
Definition
|
|
Term
|
Definition
| discretionary access control |
|
|
Term
What refers to a scheme where users are given the ability to determine the permissions governing access to their own files? |
|
Definition
| discretionary access control |
|
|
Term
| What is a more restrictive scheme that does not allow users to define permissions on files, regardless of ownership. Instead, security decisions are made by a central policy administrator. |
|
Definition
|
|
Term
| What is a formal framework for specifying security policy in a precise language, which is usually a type of logic or programming language, together with a mechanism for ensuring that the specified policy is enforced. |
|
Definition
|
|
Term
| A trust management system consists of two main components: |
|
Definition
a policy language
a compliance checker |
|
|
Term
| A trust management system typically has rules describing what 4 things: |
|
Definition
| actions, principals, policies and credentials |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| intrusion detection system |
|
|
Term
|
Definition
| intrusion prevention system |
|
|
Term
|
Definition
|
|
Term
| A fully integrated system of components and services, including a partner ecosystem, that delivers consistent security across the network, endpoints, and cloud. |
|
Definition
| security operating platform |
|
|
Term
| what three key components make up the security operating platform? |
|
Definition
network security
advanced endpoint protection
cloud security |
|
|
Term
| what essential functional capabilities within an effective NFG allow complete visibility? |
|
Definition
application identification
user identification
content identification |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| a network filter that allows administrators to restrict access to external content from within a network is known as what? |
|
Definition
|
|
Term
| within TCP is an object known as what, which is the piece of the system that manages access controls? |
|
Definition
|
|
Term
| the process of adjusting an IDPS to maximize its efficiency in detecting true positives while minimizing false positives and false negatives is known as what? |
|
Definition
|
|
Term
| the commonly used name for an intermediate area between a trusted network and an untrusted network is what? |
|
Definition
|
|
Term
| which type of firewall filtering allows the firewall to react to an emergent event and update or create rules to deal with the event? |
|
Definition
|
|
Term
| T or F: a wireless security toolkit should include the ability to sniff wireless traffic, scan wireless hosts, and assess the level of privacy or confidentiality afforded on the wireless network. |
|
Definition
|
|
Term
| the method by which systems determine whether and how to admit a user into a trusted area of the organization is known as what? |
|
Definition
|
|
Term
| T or F: signature-based IDPS technology is widely used because many attacks have clear and distinct signatures |
|
Definition
|
|
Term
| what term is used to describe decoy systems designed to lure potential attackers away from critical systems? |
|
Definition
|
|
Term
| T or F: the authentication factor "something a supplicant has" relies upon individual characteristics, such as fingerprints, palm prints, hand topography, hand geometry, or retina and iris scans. |
|
Definition
|
|
Term
| a set of day-one, next-generation firewall configuration templates for PAN-OS that are based on security best practice recommendations |
|
Definition
|
|
Term
| which PA series firewall brings next-generation firewall capabilities to distributed enterprise branch offices, retail locations, and midsize businesses in a small form factor |
|
Definition
|
|
Term
| which palo alto networks NGFW report can be created and scheduled to show exactly the information you want to see by filtering on conditions and columns to include. You can also include query builders for more specific details in report data. |
|
Definition
|
|
Term
| which palo alto networks NGFW logs display entries for the security rules that help prevent sensitive information such as credit card numbers from leaving the area that the firewall protects? |
|
Definition
|
|
Term
| which security operating platform capability supports a coordinated security platform that accounts for the full scope of an attack, across the various security controls that compose the security posture. This allows organizations to quickly identify and block known threats |
|
Definition
| prevent all known threats, fast |
|
|
Term
| which content-id filtering capability controls the transfer of sensitive data patterns such as credit card and social security numbers in application content and attachments? |
|
Definition
|
|
Term
| what is an intrusion prevention feature that protects networks from all types of vulnerability exploits, buffer overflows, DoS attacks, and port scans that lead to the compromise of confidential and sensitive enterprise information |
|
Definition
|
|
Term
| on the NGFW, which type of user-id technique can be configured to probe microsoft windows servers for active network sessions of a user? |
|
Definition
|
|
Term
| which application identification technique determines whether the initially detected application protocol is the "real one" or if it is being used as a tunnel to hide the actual application |
|
Definition
|
|
Term
| what feature of the NGFW integrates multiple threat prevention disciplines (IPS, anti-malware, URL filtering, etc) into a single stream-based engine with a uniform signature format |
|
Definition
|
|
Term
which key capability is this of the security operating platform:
to understand the full context of an attack, visibility of all users and devices is provided across the organization's network, endpoint, cloud, and SaaS applications |
|
Definition
|
|
Term
which key capability is this of the security operating platform:
best-of-breed technologies that are natively integrated provide a prevention architecture that inherently reduces the attack surface. This type of architecture allows organizations to exert positive control based on applications, users, and content, with support for open communication, orchestration, and visibility |
|
Definition
| reduce the attack surface |
|
|
Term
which key capability is this of the security operating platform:
a coordinated security platform accounts for the full scope of an attack, across the various security controls that compose the security posture. This allows organizations to quickly identify and block known threats. |
|
Definition
| prevent all known threats, fast |
|
|
Term
which key capability is this of the security operating platform:
building security that simply detects threats and requires a manual response is too little, too late. Automated creation and delivery of near-real-time protections against new threats to the various security solutions in the organization's environments enable dynamic policy updates. These updates are designed to allow enterprises to scale defenses with technology, rather than people. |
|
Definition
| detect and prevent new, unknown threats with automation |
|
|
Term
| what is a tightly integrated system of components and services, including a partner ecosystem, that delivers consistent security across the network, endpoints, and cloud |
|
Definition
| security operating platform |
|
|
Term
| what are the 3 key components of the security operating platform |
|
Definition
network security
advanced endpoint protection
cloud security |
|
|
Term
what is the key security operating platform element here:
the foundation of the security operating platform available in physical, virtual and cloud-delivered deployment options to provide consistent protection wherever your data and apps reside |
|
Definition
|
|
Term
what is the key security operating platform element here:
add-on enhanced threat services and ngfw capabilities, including DNS security, URL filtering, threat prevention, and wildfire malware prevention |
|
Definition
|
|
Term
what is the key security operating platform element here:
provides centralized network security management, simplifying administration while delivering comprehensive controls and deep visibility into network-wide traffic and security threats |
|
Definition
|
|
Term
what is the essential function capability in an effective ngfw described here:
accurately identify applications regardless of port, protocol, evasive techniques, or encryption. Provide visibility of applications and granular policy-based control over applications, including individual application functions |
|
Definition
| application identification |
|
|
Term
what is the essential function capability in an effective ngfw described here:
accurately identify users and subsequently use identity information as an attribute for policy control |
|
Definition
|
|
Term
what is the essential function capability in an effective ngfw described here:
control traffic based on complete analysis of all allowed traffic, using multiple threat prevention and data loss prevention techniques in a single-pass architecture that fully integrates all security functions |
|
Definition
|
|
Term
|
Definition
| internet protocol security |
|
|
Term
|
Definition
| advanced encryption standard |
|
|
Term
|
Definition
| generic routing encapsulation |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| triple data encryption standard |
|
|
Term
|
Definition
| public key infrastructure |
|
|
Term
| the simplest kind of encryption that involves only one secret key to cipher and decipher information |
|
Definition
|
|
Term
| public key cryptography which uses two keys to encrypt plain text |
|
Definition
|
|
Term
| used in conjunction with an algorithm to create ciphertext from plaintext |
|
Definition
|
|
Term
| process of making and using codes to secure the transmissions of information |
|
Definition
|
|
Term
| the science of encryption |
|
Definition
|
|
Term
| hybrid cryptosystem that has become the open-source de facto standard for encryption and authentication of email and file storage applications |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| advanced encryption standard |
|
|
Term
| what encryption replaced DES |
|
Definition
|
|
Term
developed by IBM in early 1970s first modern symmetric cipher general structure still used |
|
Definition
|
|
Term
| what kind of cipher is DES |
|
Definition
|
|
Term
| initially created as a replacement for DES |
|
Definition
|
|
Term
block cipher that works on 128-bit blocks selected as replacement for DES |
|
Definition
|
|
Term
| also known as Rijndael block cipher |
|
Definition
|
|
Term
| most widely used symmetric cipher |
|
Definition
|
|
Term
a symmetric block cipher designed in 1993 by bruce schneier noncommercial product |
|
Definition
|
|
Term
a stream cipher developed by Ron Rivest more than one version |
|
Definition
|
|
Term
a block cipher substitution-permutation network like AES all operations executed in parallel |
|
Definition
|
|
Term
developed by national security agency (nsa) process was highly controversial unbalanced Feistel network |
|
Definition
|
|
Term
|
Definition
|
|
Term
| most basic encryption mode |
|
Definition
|
|
Term
|
Definition
|
|
Term
| mathematical function that condenses data to a fixed size |
|
Definition
|
|
Term
|
Definition
|
|
Term
| Secure Access Service Edge |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| software-defined wide-area network |
|
|
Term
|
Definition
| zero trust network access |
|
|
Term
|
Definition
|
|
Term
|
Definition
| secure access service edge |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| cloud access security broker |
|
|
Term
|
Definition
| allowed and provided by IT |
|
|
Term
|
Definition
| allowed because of a legitimate business need, with restrictions, but not provided by IT |
|
|
Term
|
Definition
| not allowed then controlling their usage with granular policies |
|
|
Term
|
Definition
| information access & protection |
|
|
Term
|
Definition
| cloud-native security platform |
|
|
Term
|
Definition
| continuous integration/continuous delivery |
|
|
Term
| an approach to building & running applications that takes full advantage of a cloud computing delivery model instead of an on-premises data center |
|
Definition
|
|
Term
| What 3 solution are included in Palo Alto Networks CNSP |
|
Definition
prisma cloud prisma access prasma saas |
|
|
Term
| Prisma Cloud rests on what four pillars |
|
Definition
visibility, governance, & compliance compute security network protection identity security |
|
|
Term
|
Definition
| integrated development environment |
|
|
Term
|
Definition
| software configuration management |
|
|
Term
|
Definition
| user and entity behavior analytics |
|
|
Term
| cybersecurity solution or feature that discovers threats by identifying activity that deviates from a baseline |
|
Definition
|
|
Term
| the task of tracking and controlling changes in software |
|
Definition
|
|
Term
| a software application that provides comprehensive tools - such as a source code editor, build automation tools, and a debugger - for application developers |
|
Definition
|
|
Term
|
Definition
| runtime application self-protection |
|
|
Term
| detect attacks against an application in real time |
|
Definition
|
|
Term
|
Definition
| identity and access management |
|
|
Term
| uniquely identifies users & groups in a directory service (ie active directory), controls what resources those users & groups can access, and what functions they can perform on a resource |
|
Definition
|
|
Term
|
Definition
| multiprotocol label switching |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| security assertion markup language |
|
|
Term
| philosophy developed by Forrester to identify the need to protect data |
|
Definition
| never trust, always verify |
|
|
Term
|
Definition
| software-defined perimeter |
|
|
Term
| security-as-a-service layer in Prisma Access delivers what key capabilities |
|
Definition
dns security firewall as a service threat prevention secure web gateway (swg) data loss prevention (dlp) cloud access security broker (casb) |
|
|
Term
|
Definition
|
|
Term
| this provides continuous monitoring of public clouds and helps organizations achieve a continuous state of compliance in their public cloud workloads |
|
Definition
|
|
Term
| GlobalProtect allows secure access from where when enabling of partner or contractor access to protected applications is needed? |
|
Definition
|
|
Term
| t/f - globalprotect provides a vpn solution |
|
Definition
|
|
Term
| t/f - globalprotect gateways direct all client traffic to the appropriate globalprotect portal |
|
Definition
|
|
Term
| what 3 options can be classified as vpn challenges: |
|
Definition
deep packet inspection analysis of data per regulatory & compliance policies maintenance & updating of client apps & services |
|
|
Term
| what is the globalprotect dashboard that allows you to use widgets and filter to evaluate & summarize trends related to your mobile devices & compliance status? |
|
Definition
| mobile security manager (MSM) |
|
|
Term
| what are the 3 features of panorama? |
|
Definition
simpler policy enforcement streamlined management & automation insights to prevent cyberattacks |
|
|
Term
|
Definition
| application command center |
|
|
Term
| what are the 3 panorama deployment modes |
|
Definition
panorama mode management mode log collector mode |
|
|
Term
|
Definition
| open-source intelligence providers |
|
|
Term
|
Definition
| information sharing and analysis centers |
|
|
Term
|
Definition
| computer emergency response teams |
|
|
Term
|
Definition
| representational state transfer |
|
|
Term
|
Definition
| structured threat information expression |
|
|
Term
|
Definition
| extensible markup language |
|
|
Term
| an architectural programming style that typically runs over HTTP; commonly used for mobile apps, social networking websites, and mashup tools |
|
Definition
|
|
Term
| a XML format for conveying data about cybersecurity threats in a standardized format |
|
Definition
|
|
Term
| a programming language specification that defines a set of rules for encoding documents in a human-readable and machine-readable format |
|
Definition
|
|
Term
| an open-source application that streamlines the aggregation, enforcement and sharing of threat intelligence. |
|
Definition
|
|
Term
|
Definition
|
|