New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Palo Alto Networks PSE-Platform Exam - Topic 1 Question 55 Discussion

Actual exam question for Palo Alto Networks's PSE-Platform exam
Question #: 55
Topic #: 1
[All PSE-Platform Questions]

Which configuration creates the most comprehensive ''best-practice'' Anti Spyware profile to prevent command and Control traffic?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Erasmo
3 months ago
Really? I’m surprised people think D is the best.
upvoted 0 times
...
Naomi
3 months ago
A has the strictest settings, can't go wrong there!
upvoted 0 times
...
Ellsworth
3 months ago
Isn't C already set up? Seems too easy.
upvoted 0 times
...
Graham
4 months ago
I disagree, B seems more balanced.
upvoted 0 times
...
Edna
4 months ago
I think option D is the best choice!
upvoted 0 times
...
Dell
4 months ago
I lean towards option D because it builds on the Strict profile, which should already have solid defenses in place. But I wonder if just editing is sufficient.
upvoted 0 times
...
Mariann
4 months ago
I feel like option C could work since it mentions that DNS Sinkholing and Passive DNS Monitoring are already enabled, but I'm not confident if editing is enough.
upvoted 0 times
...
Micaela
4 months ago
I'm not entirely sure, but I remember something about the Default profile being less comprehensive. Maybe option B is a safer bet?
upvoted 0 times
...
Lavera
5 months ago
I think option A might be the best choice since cloning the Strict profile seems like it would provide stronger protection.
upvoted 0 times
...
Osvaldo
5 months ago
Hmm, I'm not sure if I fully understand the differences between the Strict and Default profiles. I'll need to review the details of each one to determine which configuration would be the most effective.
upvoted 0 times
...
Shay
5 months ago
I'm feeling pretty confident about this one. Cloning the Strict profile and adding the DNS sinkholing and passive DNS monitoring seems like the most comprehensive approach to prevent command and control traffic.
upvoted 0 times
...
Laurene
5 months ago
I'm a bit confused by the wording here. Does "best-practice" mean the most secure option, or the one that's most commonly used? I'll need to think this through carefully.
upvoted 0 times
...
Lai
5 months ago
Okay, let's see. I think cloning the Strict Anti-Spyware Profile and then enabling the additional features might be the way to go. That should give us the best overall protection.
upvoted 0 times
...
Lina
5 months ago
Hmm, this seems like a tricky one. I'll need to carefully read through the options and think about which configuration would provide the most comprehensive anti-spyware protection.
upvoted 0 times
...
Tonja
5 months ago
Okay, I've got a strategy for this. I'll start by eliminating the options I'm confident are costs, then focus on the remaining one to determine if it's truly not a cost associated with a variable annuity.
upvoted 0 times
...
Ilene
5 months ago
This looks like a classic directory traversal attack. The event log shows suspicious activity that could allow an attacker to access files and directories outside the intended web application path.
upvoted 0 times
...
Dong
2 years ago
I'm leaning towards option D, editing and deploying the Strict Anti-Spyware Profile seems like a good approach to me.
upvoted 0 times
...
Brandon
2 years ago
I disagree, I believe option A is better as it involves cloning the Strict Anti-Spyware Profile for a more comprehensive setup.
upvoted 0 times
...
Olive
2 years ago
I think option B is the best choice because it already includes DNS Sinkholing and Passive DNS Monitoring.
upvoted 0 times
...
Mattie
2 years ago
Haha, yeah, I can just imagine someone trying to use the Strict profile and then complaining that their machine is running like a snail. Better to start with the Default profile and add the good stuff on top. Although, I do wonder if there are any hidden gotchas with that approach that we're not considering.
upvoted 0 times
...
Evangelina
2 years ago
You know, I was initially drawn to option D, since the Strict profile already has those features enabled. But then I realized, if we're going for a 'best-practice' approach, cloning and customizing the profile might be better. That way, we can tailor it to our specific needs, rather than just blindly using the pre-configured one.
upvoted 0 times
Queenie
2 years ago
Yeah, you're right. It's better to customize and deploy a clone to maintain flexibility and avoid potential issues.
upvoted 0 times
...
Maybelle
2 years ago
C) Edit and deploy the Default Anti-Spyware Profile (DNS Sinkholing and Passive DNS Monitoring is already enabled)
upvoted 0 times
...
Fidelia
2 years ago
But wouldn't it be safer to clone and customize the profile instead of editing the strict one directly?
upvoted 0 times
...
Antione
2 years ago
D) Edit and deploy the Strict Anti-Spyware Profile Profile (DNS Sinkholing and Passive DNS Monitoring is already enabled)
upvoted 0 times
...
Nieves
2 years ago
That's a good point. Customizing the profile to fit our specific needs does seem like the best approach.
upvoted 0 times
...
Anabel
2 years ago
B) Clone the Default Anti-Spyware Profile and enable DNS Sinkholing and Passive DNS Monitoring, and deploy this customized clone
upvoted 0 times
...
Jeanice
2 years ago
A) Clone the Strict Anti-Spyware Profile, enable DNS Sinkholing and Passive DNS Monitoring, and deploy this customized clone
upvoted 0 times
...
...
Lennie
2 years ago
I agree with you on that. Option B seems like the sweet spot - we get the core anti-spyware protections, plus the added benefits of DNS Sinkholing and Passive DNS Monitoring. That should cover most of the common command and control traffic scenarios without being too heavy-handed.
upvoted 0 times
...
Emile
2 years ago
Hmm, this question seems a bit tricky. I'm not sure if cloning the Strict Anti-Spyware Profile is the best approach, as that might be overkill for some use cases. I'm leaning more towards option B, where we clone the Default profile and enable the additional features. That way, we get the best-practice settings without going overboard.
upvoted 0 times
...

Save Cancel