New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Palo Alto Networks PSE-Platform Exam - Topic 1 Question 59 Discussion

Actual exam question for Palo Alto Networks's PSE-Platform exam
Question #: 59
Topic #: 1
[All PSE-Platform Questions]

Which profile or policy should be applied to protect against port scans from the internet?

Show Suggested Answer Hide Answer
Suggested Answer: C, D

Contribute your Thoughts:

0/2000 characters
Deangelo
3 months ago
C is more about management, not really for blocking scans.
upvoted 0 times
...
Lonna
3 months ago
Wait, can a zone protection profile really handle all port scans?
upvoted 0 times
...
Yolande
3 months ago
A seems too broad, not specific enough for port scans.
upvoted 0 times
...
Georgiann
4 months ago
I think B could work too, but not as effective as D.
upvoted 0 times
...
Vallie
4 months ago
Definitely D, zone protection is key for that!
upvoted 0 times
...
Carole
4 months ago
I’m a bit confused. Could it be the interface management profile? I remember it being mentioned, but I’m not sure how it relates to port scans.
upvoted 0 times
...
Samuel
4 months ago
I feel like we practiced a question similar to this, and the zone protection profile was the answer. It makes sense for port scans.
upvoted 0 times
...
Nina
4 months ago
I'm not entirely sure, but I remember something about App-ID policies being more about application traffic rather than just blocking scans.
upvoted 0 times
...
Alishia
5 months ago
I think we talked about using a zone protection profile for ingress interfaces in class. That seems relevant here.
upvoted 0 times
...
Bernardine
5 months ago
This is a good one. I'd say the best approach is to use an App-ID security policy rule to specifically block traffic from the untrust zone. That way you can target the port scan activity directly.
upvoted 0 times
...
Lai
5 months ago
I'm a bit confused by the options here. Is an App-ID policy the same as a security policy rule? And what's the difference between a security profile and a zone protection profile?
upvoted 0 times
...
Glennis
5 months ago
Okay, I think I've got this. The key is to look at the traffic source and destination zones. A zone protection profile on the untrust zone should do the trick.
upvoted 0 times
...
Aja
5 months ago
Hmm, I'm not too familiar with the Palo Alto security profiles and policies. I'll have to review my notes on that.
upvoted 0 times
...
Peggy
5 months ago
This looks like a tricky security question. I'll need to think through the different options carefully.
upvoted 0 times
...
Raina
5 months ago
This looks like a pretty straightforward question. I'll carefully read through the options and think about which one is the exception.
upvoted 0 times
...
Odette
5 months ago
Okay, let me visualize the network topology and the LSP paths. I think I know the answer, but I want to double-check my understanding.
upvoted 0 times
...
Gerald
9 months ago
D) Zone protection profile? Is that like a superhero cape for my firewall? Because if it is, I want one with glitter and unicorns.
upvoted 0 times
...
Keva
9 months ago
Wait, we're supposed to protect against port scans? I thought we were supposed to run as many port scans as possible to get a high score. Guess I've been doing this all wrong.
upvoted 0 times
Krissy
8 months ago
D) Zone protection profile on the zone of the ingress interface
upvoted 0 times
...
Horace
8 months ago
C) Interface management profile on the zone of the ingress interface
upvoted 0 times
...
Denny
8 months ago
B) Security profiles to security policy rules for traffic sourcing from the untrust zone
upvoted 0 times
...
Aja
8 months ago
A) An App-ID security policy rule to block traffic sourcing from the untrust zone
upvoted 0 times
...
...
Magdalene
10 months ago
B) Security profiles to security policy rules? Now we're talking! I bet the person who wrote this question spends their weekends coding up complex firewall policies for fun.
upvoted 0 times
Gerald
8 months ago
D) Zone protection profile on the zone of the ingress interface
upvoted 0 times
...
Elfrieda
9 months ago
B) Security profiles to security policy rules for traffic sourcing from the untrust zone
upvoted 0 times
...
Victor
9 months ago
C) Interface management profile on the zone of the ingress interface
upvoted 0 times
...
Blair
9 months ago
A) An App-ID security policy rule to block traffic sourcing from the untrust zone
upvoted 0 times
...
Olive
10 months ago
B) Security profiles to security policy rules for traffic sourcing from the untrust zone
upvoted 0 times
...
Helga
10 months ago
A) An App-ID security policy rule to block traffic sourcing from the untrust zone
upvoted 0 times
...
...
Suzi
10 months ago
C) Interface management profile? Really? That's like trying to catch a speeding bullet with a butterfly net. Not the most effective solution, if you ask me.
upvoted 0 times
...
Vallie
10 months ago
A) An App-ID security policy rule? Nah, that's way too complicated. I just want something that's going to block those scans without making me think too hard.
upvoted 0 times
...
Apolonia
10 months ago
D) Zone protection profile on the zone of the ingress interface seems like the obvious choice here. I mean, who doesn't love a good zone profile to protect against those pesky port scans?
upvoted 0 times
Gary
10 months ago
D) Zone protection profile on the zone of the ingress interface
upvoted 0 times
...
Idella
10 months ago
C) Interface management profile on the zone of the ingress interface
upvoted 0 times
...
Glenn
10 months ago
B) Security profiles to security policy rules for traffic sourcing from the untrust zone
upvoted 0 times
...
Chu
10 months ago
A) An App-ID security policy rule to block traffic sourcing from the untrust zone
upvoted 0 times
...
...
Latricia
10 months ago
I'm not sure, but I think A) An App-ID security policy rule could also work to block the traffic.
upvoted 0 times
...
Cary
10 months ago
I agree with Janine, using a Zone protection profile makes sense to protect against port scans.
upvoted 0 times
...
Janine
11 months ago
I think the answer is D) Zone protection profile on the zone of the ingress interface.
upvoted 0 times
...
Gaynell
11 months ago
I'm not sure, but I think option B) Security profiles to security policy rules for traffic sourcing from the untrust zone could also work.
upvoted 0 times
...
Becky
11 months ago
I agree with Izetta, using a Zone protection profile can help protect against port scans from the internet.
upvoted 0 times
...
Izetta
11 months ago
I think option D) Zone protection profile on the zone of the ingress interface would be the best choice.
upvoted 0 times
...

Save Cancel