UPDATE (ALREADY GRADED A+)
Valid Selections in Anti-Spyware Profile
Two valid selections within an Anti-Spyware profile are 'Drop' and 'Deny'.
Zero Trust Firewall
A security model that requires strict identity verification for every person and device trying to access
resources on a private network.
Outbound Data Flow
Data leaving a network or system.
North South Traffic
Traffic that flows between the data center and the outside world.
Inbound Data Flow
Data entering a network or system.
East West Traffic
Traffic that flows between devices within the same data center.
Bulletproof IP Addresses
IP addresses used by hosting providers that place few restrictions on content, often used to distribute
illegal or unethical material.
Panorama Managed Devices
Devices that are managed by Panorama, which centralizes the management of multiple firewalls.
Local Configuration Locks
Locks that prevent changes to security policies on Panorama managed devices until removed.
Layer 3 Zone
A zone that is a member of an Ethernet interface configured with an IPv4 address.
Intrazone Security Policy Rule
A rule that applies to traffic within the same security zone.
Concurrent Administrative Account Sessions
The maximum number of simultaneous sessions allowed for administrative accounts.
AntiSpyware Profiles
, Predefined settings that help detect and prevent spyware on a network.
Firewall GUI Tags
Labels used within the firewall's graphical user interface to categorize and manage objects.
Log at Session Start
A logging option that records the beginning of a session.
Log at Session End
A logging option that records the conclusion of a session.
Zero Trust Concepts
Principles applied by a Palo Alto Networks firewall to prevent threats, including user identification,
filtration protection, vulnerability protection, antivirus, application identification, and anti-spyware.
Content Inspection Timing
The stage in the packet flow process when content inspection occurs, specifically after application
identification.
DNS Sinkholing
A technique used to redirect malicious DNS requests to a controlled IP address.
MAC Address
A unique identifier assigned to network interfaces for communications at the data link layer.
IPv4 Address
An Internet Protocol address in version 4, consisting of four octets.
Security Profile
A set of rules and settings applied to network traffic to enhance security.
File Sharing Applications
Software that enables the sharing of files over a network.
match condition in the Security policy
an application filter for applications whose subcategory is file-sharing
Security policy rules statement
The view Rulebase as Groups is checked.
types of route
BGP and static route