


Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A comprehensive overview of sophos firewall, covering key security features and concepts. It explores the zero trust framework, the attack kill chain, and various security mechanisms like web protection, email encryption, and advanced threat protection. The document also includes explanations of sophos's unique technologies, such as zero-day protection and deep learning, and how they contribute to a robust security posture. This resource is valuable for individuals seeking to understand the fundamentals of sophos firewall and its role in safeguarding networks.
Typology: Exams
1 / 4
This page cannot be seen from the preview
Don't miss anything!
What is Zero Trust? - answer It is the mindset of don't trust anything verify everything What is ZTNA? - answer Sophos's Zero Trust Network Access What is Sophos Lateral Protection? - answer It is a micro segmentation solution. If device becomes infected it will be isolated to stop the attack or regardless of the Network Topology What are the three key features of Sophos Firewall? - answer It is a comprehensive security device, with a zone-based firewall and Identity-based policies at its core. It can expose hidden risk, stop unknown threats and isolate infected systems It supports ZTNA by providing network segmentation and lateral movement protection What are the phases of the Attack Kill Chain? - answer 1. Reconnaissance
What happens in the Delivery phase of the Attack Kill Chain? - answer The attacker will access the estate to deliver the malicious payload via methods such as Email or social engineering to direct the victim to a malicious site What does Sophos Web Protection do? - answer By scanning http/https traffic for unwanted content and malware. What does Web Filtering do? - answer Web filtering can allow or block sites based on content filters What is Email Encryption and Control? - answer Sophos Firewall can scan incoming email for malicious content. IP reputation is enabled that allows you to accept/drop/block emails from known Spam IP's. File type detection can scan and block specific file types e.g any macro enabled files will be blocked. Email protection allows you to encrypt emails so you can send data securely out of the network using SPX What is SPX? - answer Sophos Secure PDF Exchange Encryption What is Sophos Zero-Day Protection? - answer Sophos Zero Day protection uses Hash files created when a Sophos Firewall scans an attachment with an executable. The hash file is then sent to the cloud database for review, and Firewall will then either block or allow it depending if it is deemed save or malicious. Zero-Day protection will also send in depth reports on all attack events as configured. What happens when Sophos Zero-Day Protection reviews a hash file it hasn't seen before?
What does ATP stand for? - answer Advanced Threat Protection What happens in the Behaviour phase of the Attack Kill Chain? - answer Depending on the malware installed, the behaviour of the infected machine will vary but can include encrypting files for Ransom, or Spyware that steals and downloads information such as passwords or payment information How does Sophos Automatic Device Isolation work? - answer Server Protection and Intercept X are used to assign each device a health status. If a device is compromised, the device can be automatically isolated from other areas of the network via the firewall and communicating with other devices. This limits infection of other devices on the network What does Email protection Control do? - answer Stops information being leaked outside of the organisation by email. You can create control lists to drop personal identifiable information and financial data types depending on the action configured in the policy