UPDATE (ALREADY GRADED A+)
Zone Protection profiles
Configured in Panorama under Templates.
Custom URL category
Combines URL categories 'high-risk' and 'known-risk' to prevent access to risky media content websites.
Cyber-Attack Lifecycle
The stage where the attacker can run malicious code is called Exploitation.
Antivirus updates interval
The recommended interval for antivirus updates for mission critical devices is daily.
IP Wildcard Mask
An address object of type IP Wildcard Mask can only be referenced in a Security policy rule.
IP Wildcard Mask format
Enter an IP wildcard address in the format of an IPv4 address followed by a slash and a mask (e.g.,
10.182.1.1/0.127.248.0).
Authentication methods for role-based access control
SAML and TACACS+ support authentication and authorization.
Service groups
Used to set up a group of objects based on their ports alone.
Security Profile
Can block or allow traffic after it is matched to a Security policy rule that allows traffic.
Application Filter
Available filter columns include Parent App, Category, and Risk.
Domain Generation Algorithms (DGAs)
Algorithms used to auto-generate domains, typically in large numbers, for malicious command-and-
control (C2) communications.
Factors in Domain Generation Algorithms
Three factors that can be used include cryptographic keys, time of day, and other unique values.
DNS Signatures