What is the primary function of an advanced cloud sandbox in cybersecurity?
It provides a safe, isolated virtual environment for opening suspicious files, running untrusted programs, or downloading URLs without affecting local devices or the company network.
What is a key advantage of cloud sandboxing over on-premise sandboxing for remote workers?
Cloud sandboxing can protect users both on and off the corporate network, unlike on-premise solutions that run on physical appliances.
Why is cloud sandboxing considered superior to appliance-based sandboxing for inspecting SSL traffic?
Cloud sandboxing offers the ability to inspect SSL traffic, a frequent hiding place for malware, which many physical appliances cannot do effectively.
A _____ is a deep-packet inspection firewall that adds application-level inspection and intrusion prevention.
next generation firewall (NGFW)
What fundamental capability distinguishes a Next-Generation Firewall (NGFW) from a traditional firewall?
An NGFW’s ability to filter packets based on applications, not just ports and protocols.
What is the term for intercepting SSL/TLS encrypted internet communication between a client and server, a technique also used in man-in-the-middle (MiTM) attacks?
SSL/TLS Inspection or HTTPS Interception.
Define an Advanced Persistent Threat (APT).
An attack where an unauthorized person gains access to a network and stays there undetected for a prolonged period.
In an APT, what is the role of the command-and-control (C&C) servers?
The malware is in regular communication with C&C servers to send stolen data or receive new instructions.
What is the purpose of Advanced Threat Protection (ATP) solutions?
They defend against sophisticated malware or attacks that are designed to evade traditional security protections like antivirus and firewalls.
What is the function of anti-virus protection as defined in the glossary?
It checks files downloaded from the internet against a database of known malicious files.
The practice of allocating available bandwidth to optimize performance for mission-critical applications over recreational ones is known as _____.
Bandwidth Control
What is a botnet?
A number of internet-capable devices that have been hijacked by malicious users and infected with code without the owners’ knowledge.
What is the goal of Branch Transformation in IT?
To enable traffic in a branch office to be routed directly and securely to the internet, rather than backhauling through a central data center.
How does browser isolation enhance security?
It separates browsing activity from the endpoint hardware by loading webpages on a remote browser and streaming only pixels to the user, preventing malicious code download.
What is a Content Delivery Network (CDN)?
A distributed system of servers that copies and delivers web content to users based on their geographic location to speed up page loads.
In cloud terminology, what does ‘the cloud’ generically refer to?
Any software and services that run on servers in data centers, as opposed to running on a user’s local computer.
What is the main distinction between a public cloud and a private cloud?
A public cloud is a multi-tenant environment shared by many organizations, while a private cloud is a single-tenant environment dedicated to a single organization.
What is Cloud Application Visibility?
The ability to see all the cloud applications being used throughout an organization, enabling control and data protection.
Cloud architecture consists of a front-end and a back-end. What does the back-end encompass?
It consists of all the infrastructure required for the cloud service, including servers, data storage, virtual machines, and security mechanisms.
What are the three main categories of cloud computing?
Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
What is a cloud firewall?
A firewall that provides network security and application control features delivered from the cloud, without requiring physical hardware.
How is cloud security different from traditional on-premise security?
Cloud security is delivered from the cloud, unlike traditional security which uses stacks of appliances at the gateway to scan traffic.
A _____ is an incident where sensitive data has potentially been viewed, stolen, or used by an unauthorized individual.
data breach
What is the primary goal of Data Loss Prevention (DLP) systems?
To prevent end users from sending sensitive information to unauthorized devices or recipients based on administrator-set policies.