Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Palo Alto Networks Exam PSE-Platform Topic 1 Question 59 Discussion

Actual exam question for Palo Alto Networks's PSE-Platform exam
Question #: 59
Topic #: 1
[All PSE-Platform Questions]

Which profile or policy should be applied to protect against port scans from the internet?

Show Suggested Answer Hide Answer
Suggested Answer: C, D

Contribute your Thoughts:

Gerald
1 months ago
D) Zone protection profile? Is that like a superhero cape for my firewall? Because if it is, I want one with glitter and unicorns.
upvoted 0 times
...
Keva
1 months ago
Wait, we're supposed to protect against port scans? I thought we were supposed to run as many port scans as possible to get a high score. Guess I've been doing this all wrong.
upvoted 0 times
Denny
3 days ago
B) Security profiles to security policy rules for traffic sourcing from the untrust zone
upvoted 0 times
...
Aja
10 days ago
A) An App-ID security policy rule to block traffic sourcing from the untrust zone
upvoted 0 times
...
...
Magdalene
2 months ago
B) Security profiles to security policy rules? Now we're talking! I bet the person who wrote this question spends their weekends coding up complex firewall policies for fun.
upvoted 0 times
Gerald
8 days ago
D) Zone protection profile on the zone of the ingress interface
upvoted 0 times
...
Elfrieda
14 days ago
B) Security profiles to security policy rules for traffic sourcing from the untrust zone
upvoted 0 times
...
Victor
21 days ago
C) Interface management profile on the zone of the ingress interface
upvoted 0 times
...
Blair
23 days ago
A) An App-ID security policy rule to block traffic sourcing from the untrust zone
upvoted 0 times
...
Olive
1 months ago
B) Security profiles to security policy rules for traffic sourcing from the untrust zone
upvoted 0 times
...
Helga
2 months ago
A) An App-ID security policy rule to block traffic sourcing from the untrust zone
upvoted 0 times
...
...
Suzi
2 months ago
C) Interface management profile? Really? That's like trying to catch a speeding bullet with a butterfly net. Not the most effective solution, if you ask me.
upvoted 0 times
...
Vallie
2 months ago
A) An App-ID security policy rule? Nah, that's way too complicated. I just want something that's going to block those scans without making me think too hard.
upvoted 0 times
...
Apolonia
2 months ago
D) Zone protection profile on the zone of the ingress interface seems like the obvious choice here. I mean, who doesn't love a good zone profile to protect against those pesky port scans?
upvoted 0 times
Gary
1 months ago
D) Zone protection profile on the zone of the ingress interface
upvoted 0 times
...
Idella
2 months ago
C) Interface management profile on the zone of the ingress interface
upvoted 0 times
...
Glenn
2 months ago
B) Security profiles to security policy rules for traffic sourcing from the untrust zone
upvoted 0 times
...
Chu
2 months ago
A) An App-ID security policy rule to block traffic sourcing from the untrust zone
upvoted 0 times
...
...
Latricia
2 months ago
I'm not sure, but I think A) An App-ID security policy rule could also work to block the traffic.
upvoted 0 times
...
Cary
2 months ago
I agree with Janine, using a Zone protection profile makes sense to protect against port scans.
upvoted 0 times
...
Janine
2 months ago
I think the answer is D) Zone protection profile on the zone of the ingress interface.
upvoted 0 times
...
Gaynell
3 months ago
I'm not sure, but I think option B) Security profiles to security policy rules for traffic sourcing from the untrust zone could also work.
upvoted 0 times
...
Becky
3 months ago
I agree with Izetta, using a Zone protection profile can help protect against port scans from the internet.
upvoted 0 times
...
Izetta
3 months ago
I think option D) Zone protection profile on the zone of the ingress interface would be the best choice.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77