Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam PCNSA topic 1 question 115 discussion

Actual exam question from Palo Alto Networks's PCNSA
Question #: 115
Topic #: 1
[All PCNSA Questions]

You receive notification about new malware that is being used to attack hosts. The malware exploits a software bug in common application.
Which Security Profile detects and blocks access to this threat after you update the firewall's threat signature database?

  • A. Data Filtering Profile applied to outbound Security policy rules
  • B. Antivirus Profile applied to outbound Security policy rules
  • C. Data Filtering Profile applied to inbound Security policy rules
  • D. Vulnerability Protection Profile applied to inbound Security policy rules
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
ZZL
Highly Voted 2 years, 5 months ago
Agree, should be D. See study guide p153: Vulnerability Protection - Detects attempts to exploit known software vulnerabilities
upvoted 7 times
...
BeforeScope
Most Recent 1 year, 3 months ago
Selected Answer: D
Vulnerability Protection profiles stop attempts to exploit system flaws or gain unauthorized access to systems. While Anti-Spyware profiles help identify infected hosts as traffic leaves the network, Vulnerability Protection profiles protect against threats entering th e network. For example, Vulnerability Protection profiles help protect against buffer overflows, illegal code execution, and other attempts to exploit system vulnerabilities. [Palo Alto Networks]
upvoted 1 times
...
z8d21oczd
1 year, 9 months ago
Selected Answer: D
I would think that D is the most accurate because it can detect and block traffic which uses known vulnererabilies. But AntiVirus could help to avoid downloading the malware itself.. But how the question sounds, it's more likely D what they want to hear.
upvoted 2 times
...
Sandman77
1 year, 10 months ago
Selected Answer: D
D is correct
upvoted 1 times
...
kewokil120
1 year, 11 months ago
Selected Answer: D
the exploit is on a Vulnerability. The issue is whether Palo calls it that or combines it in "antivirus". Looking at the previous comments, it is obvious that Vulnerability is a separate security policy concern.
upvoted 1 times
...
LordScorpius
2 years ago
Selected Answer: D
the exploit is on a Vulnerability. The issue is whether Palo calls it that or combines it in "antivirus". Looking at the previous comments, it is obvious that Vulnerability is a separate security policy concern.
upvoted 1 times
...
zeebo340
2 years, 1 month ago
Vulnerability Protection Security Profiles stop attempts to exploit system flaws or gain unauthorized access to systems. Anti-Spyware Security Profiles identify infected hosts as traffic leaves the network, but Vulnerability Protection Security Profiles protect against threats entering the network. For example, Vulnerability Protection Security Profiles protect against buffer overflows, illegal code execution, and other attempts to exploit system vulnerabilities Correct answer is D Ref - PCNSA Study Guide 2022 - P157
upvoted 4 times
...
Jheax
2 years, 2 months ago
D is correct
upvoted 1 times
...
Grandslam
2 years, 3 months ago
Selected Answer: D
https://www.paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/datasheets/education/pcnsa-study-guide.pdf Page 153 Vulnerability Protection - Detects attempts to exploit known software vulnerabilities
upvoted 2 times
...
Rowdy_47
2 years, 5 months ago
Apply a Vulnerability Protection profile to every Security Policy rule that allows traffic to protect against buffer overflows, illegal code execution, and other attempts to exploit client- and server-side vulnerabilities. https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interface-help/objects/objects-security-profiles-vulnerability-protection.html
upvoted 2 times
Rowdy_47
2 years, 5 months ago
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/policy/security-profiles
upvoted 1 times
...
...
Cyril_the_Squirl
2 years, 5 months ago
D is Correct
upvoted 1 times
...
Nicholasvolta
2 years, 6 months ago
I think it's D, but no one has come to this last question so there are no comments..
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...