Next-Generation
Firewall Quiz

Test your knowledge of all things firewalls and application security.
LET'S GET STARTED

What percentage of firewall breaches are caused by misconfigurations?

1/11

Please select:
20%33%50%74%99%
CORRECT
NOT CORRECT

According to Gartner, through 2023, 99% of firewall breaches will be caused by firewall misconfigurations, not firewall flaws.

NEXT QUESTION

What percentage of firewall breaches are caused by misconfigurations?

1/11

Please select:
20%33%50%74%99%

To effectively address data compromise with a firewall solution, organizations should:

2/11

Please select:
Gain control over the applications on their network to limit the avenues of data loss or compromise Scan applications for sensitive or private data, or to detect behaviors in in a multi-stage attack designed to steal or sabotage data Understand which users are initiating application transactions and why Implement appropriate control policies and technology to prevent accidental or intentional data loss or compromise All of the above
CORRECT
NOT CORRECT

All of the above.
To effectively address data compromise with a firewall solution, organizations should:

  • Gain control over the applications on their network to limit the avenues of data loss or compromise
  • Scan applications for sensitive or private data, or to detect behaviors in a multi-stage attack designed to steal or sabotage data
  • Understand which users are initiating application transactions and why
  • Implement appropriate control policies and technology to prevent accidental or intentional data loss or compromise
NEXT QUESTION

To effectively address data compromise with a firewall solution, organizations should:

2/11

Please select:
Gain control over the applications on their network to limit the avenues of data loss or compromise Scan applications for sensitive or private data, or to detect behaviors in  a multi-stage attack designed to steal or sabotage data Understand which users are initiating application transactions and why Implement appropriate control policies and technology to prevent accidental or intentional data loss or compromise All of the above

Simplifying security does NOT require:

3/11

Please select:
Consistent visibility and control Tightly integrated tools that replace manual effort Multiple security and firewall technologies Analytics that drive automatic action
CORRECT
NOT CORRECT

Simplifying security means fewer security tools and firewall technologies, not more. To simplify your security, you need a firewall platform that offers:

  • Consistent visibility and control
  • Tightly integrated tools that replace manual effort
  • Analytics that drive automatic action
NEXT QUESTION

Simplifying security requires:

3/11

Please select:
Consistent visibility and control Tightly integrated tools that replace manual effort Multiple security and firewall technologies Analytics that drive automatic action

True or False: In traditional firewall deployments, north-south traffic refers to the traffic passing between the private corporate network and the public internet.

4/11

Please select:
TrueFalse
CORRECT
NOT CORRECT

True. North-south traffic refers to the traffic passing between the private corporate network and the public internet.

NEXT QUESTION

True or False: In traditional firewalls deployed, north-south traffic refers to the traffic passing between private corporate network and the public Internet.

4/11

Please select:
TrueFalse

True or False: East-west traffic refers to traffic between systems and applications outside the data center.

5/11

Please select:
TrueFalse
CORRECT
NOT CORRECT

False. East-west traffic refers to traffic between systems and applications inside the data center.

NEXT QUESTION

True or False: East-west traffic refers to traffic between systems and applications inside the data center.

5/11

Please select:
TrueFalse

True or False: Remote access tools should always be considered risky and suspect.

6/11

Please select:
TrueFalse
CORRECT
NOT CORRECT

False. Remote access tools can be both good and bad. They’re valuable productivity tools for IT administrators and support technicians, but also prone to being exploited by attackers in order to control systems. Although many are clearly good (low risk, high reward), and others are clearly bad (high risk, low reward), most are somewhere in between. Moreover, applications can vary from one scenario to the next and from user to user or from session to session.

NEXT QUESTION

True or False: Remote access tools should always be considered risky and suspect.

6/11

Please select:
TrueFalse

More than __ % of all new malware and intrusion attempts are exploiting weaknesses in applications.

7/11

Please select:
94%80%75%40%20%
CORRECT
NOT CORRECT

More than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications as opposed to weaknesses in networking components and services. Together with the implicit trust that users place in their applications, all these factors combine to create a “perfect storm” for attackers.

NEXT QUESTION

More than __ percent of all new malware and intrusion attempts are exploiting weaknesses in applications.

7/11

Please select:
94%80%75%40%20%

__________ is increasingly used to secure not just sensitive or private information, but practically all traffic traversing enterprise networks.

8/11

Please select:
Encryption Cryptocurrency Passwords Biometrics Multi-factor authentication (MFA)
CORRECT
NOT CORRECT

Encryption is increasingly used to secure not just sensitive or private information, but practically all traffic traversing enterprise networks. According to 2019 Google findings on encrypted traffic, 87% of browsing time is spent on pages that use HTTPS, and 70% of pages are loaded on HTTPS. Organizations are essentially left blind to any security threats contained inside encrypted traffic. Attackers exploit this lack of visibility and identification to hide within encrypted traffic and spread malware. Even legitimate websites that use encryption can be infected with malware.

NEXT QUESTION

__________ is increasingly used to secure not just sensitive or private information, but practically all traffic traversing enterprise networks.

8/11

Please select:
Encryption Cryptocurrency Passwords Biometrics Multi-factor authentication (MFA)

At least ___% of data breaches involve compromised privileged credentials.

9/11

Please select:
28%62%80%83%99%
CORRECT
NOT CORRECT

According to Forrester Research, at least 80% of data breaches today involve compromised privileged credentials. Credential theft has become so prevalent in attackers’ playbooks that it’s often said attackers no longer hack into target networks; they simply log in. The primary techniques that attackers use to steal credentials include social engineering, credential phishing and spam, and reusing stolen passwords or shared credentials.

NEXT QUESTION

___% of data breaches involve compromised privileged credentials.

9/11

Please select:
28%62%80%83%99%

____________ is a tool used to classify content.

10/11

Please select:
Policy controlURL filteringThreat preventionZero TrustData loss prevention
CORRECT
NOT CORRECT

URL filtering is a tool used to classify content. An integrated, on-box URL database allows administrators to monitor and control web surfing activities of employees and guest users. Used with user identification, web usage policies can be set on a per-user basis, further safeguarding the enterprise from security risks.

NEXT QUESTION

____________ is a tool used to classify content.

10/11

Please select:
Policy controlURL filteringThreat preventionZero trustData loss prevention

_________ is a strategy designed around the concept that users, applications and data should never be trusted — that their actions should always be verified in an environment.

11/11

Please select:
Defense in depthLayered securityThreat huntingZero TrustEncryption
CORRECT
NOT CORRECT

Zero Trust is a strategy designed around the concept that users, applications and data should never be trusted - that their actions should always be verified in an environment. The primary goal of the Zero Trust model is to eliminate inherent trust in a system and prevent attackers from exploiting vulnerabilities hidden in trusted applications. The approach involves limiting the scope of an attack and blocking lateral movement by taking advantage of microsegmentation based on users, data and location.

NEXT QUESTION

_________ is a strategy designed around the concept that users, applications, and data should never be trusted - that their actions should always be verified in an environment.

11/11

Please select:
Defense in depthLayered securityThreat huntingZero TrustEncryption

Next-Generation
Firewall for Dummies

You got 0 of 11 correct.
You got 1 of 11 correct.
You got 2 of 11 correct.
You got 3 of 11 correct.
You got 4 of 11 correct.
You got 5 of 11 correct. ‍
You got 6 of 11 correct. ‍
You got 7 of 11 correct. ‍
You got 8 of 11 correct. ‍
You got 9 of 11 correct. ‍
You got 10 of 11 correct. ‍
You got 11 of 11 correct. ‍
Time to start studying!
Read our free eBook to build up your network security knowledge and keep your organization safe from the latest cyberattacks.
Not too shabby,
but there’s always more to learn! Read our free eBook to build up your network security knowledge and keep your organization safe from the latest cyberattacks.
You’re a Network Security Ninja!
Read our free eBook for even more network security tips to keep your organization safe from the latest cyberattacks.
DOWNLOAD NOW!
Share this quiz!

© 2020 Palo Alto Networks, Inc. All rights reserved.

Trademarks: Wiley, For Dummies, the Dummies Man logo, The Dummies Way, Dummies.com,Making Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc., is not associated with any product or vendor mentioned in this book.