Sophos Engineer ET80 - Sophos Firewall
Overview
What is Zero Trust? - ✔✔It is the mindset of don't trust anything verify everything
What is ZTNA? - ✔✔Sophos's Zero Trust Network Access
What is Sophos Lateral Protection? - ✔✔It is a micro segmentation solution. If device becomes
infected it will be isolated to stop the attack or regardless of the Network Topology
What are the three key features of Sophos Firewall? - ✔✔It is a comprehensive security device,
with a zone-based firewall and Identity-based policies at its core.
It can expose hidden risk, stop unknown threats and isolate infected systems
It supports ZTNA by providing network segmentation and lateral movement protection
What are the phases of the Attack Kill Chain? - ✔✔1. Reconnaissance
2. Weaponization
3. Delivery
4. Exploitation
5. Installation
6. Command and control
7. Behaviour
What happens in the Reconnaissance and Weaponization phases of the Attack Kill Chain? -
✔✔The attacker will passively harvest email addresses and company information, before
actively scanning the target environment using tools like port Scanners
Overview
What is Zero Trust? - ✔✔It is the mindset of don't trust anything verify everything
What is ZTNA? - ✔✔Sophos's Zero Trust Network Access
What is Sophos Lateral Protection? - ✔✔It is a micro segmentation solution. If device becomes
infected it will be isolated to stop the attack or regardless of the Network Topology
What are the three key features of Sophos Firewall? - ✔✔It is a comprehensive security device,
with a zone-based firewall and Identity-based policies at its core.
It can expose hidden risk, stop unknown threats and isolate infected systems
It supports ZTNA by providing network segmentation and lateral movement protection
What are the phases of the Attack Kill Chain? - ✔✔1. Reconnaissance
2. Weaponization
3. Delivery
4. Exploitation
5. Installation
6. Command and control
7. Behaviour
What happens in the Reconnaissance and Weaponization phases of the Attack Kill Chain? -
✔✔The attacker will passively harvest email addresses and company information, before
actively scanning the target environment using tools like port Scanners