PCNSE Exam QuestionsBrowse all questions from this exam

PCNSE Exam - Question 385


A network administrator notices there is a false-positive situation after enabling Security profiles. When the administrator checks the threat prevention logs, the related signature displays: threat type: spyware category: dns-c2 threat ID: 1000011111

Which set of steps should the administrator take to configure an exception for this signature?

Show Answer
Correct Answer: A,D

To configure an exception for a spyware signature categorized as DNS Command and Control (dns-c2), the appropriate steps involve navigating to the Anti-Spyware profile within the Security Profiles, selecting the DNS Exceptions tab (as this is specific to DNS threats), searching for the related threat ID, and enabling the exception. This addresses the identification of the DNS signature accurately. Therefore, the correct option is to navigate to Objects > Security Profiles > Anti-Spyware, select the related profile, select the DNS exceptions tab, search for the related threat ID, and click enable, then commit.

Discussion

11 comments
Sign in to comment
millosz222Option: D
Sep 14, 2022

100% D A. Navigate to Objects > Security Profiles > Anti-Spyware Select related profile Select the signature exceptions tab and then click show all signatures Search related threat ID and click enable Change the default action Commit there is no option to change default action only enable B. Navigate to Objects > Security Profiles > Anti-Spyware Select related profile Select the Exceptions tab and then click show all signatures Search related threat ID and click enable Commit there is no any tab for Exception only signature Exception or DNS exception C. Navigate to Objects > Security Profiles > Vulnerability Protection Select related profile Select the Exceptions tab and then click show all signatures Search related threat ID and click enable Commit for sure not vulnerability D. Navigate to Objects > Security Profiles > Anti-Spyware Select related profile Select DNS exceptions tabs Search related threat ID and click enable Commit

jeremykebir
Jul 18, 2024

100% bro

secdaddyOption: D
Sep 28, 2022

agree D Step 3 here - DNS signatures are handled differently https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/threat-prevention/create-threat-exceptions

TAKUM1yOption: D
Oct 31, 2022

https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/threat-prevention/create-threat-exceptions

Sarbi
Dec 29, 2022

100 % d checked on the Panorama

djedeenOption: D
Jan 19, 2023

D: Select Objects>Security Profiles>Anti-Spyware. Add or modify the Anti-Spyware profile from which you want to exclude the threat signature, and select DNS Exceptions. Search for the DNS Threat ID for the DNS signature that you want to exclude from enforcement and select the box of the applicable signature. . . https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/threat-prevention/create-threat-exceptions

nose999Option: D
Sep 8, 2022

https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/threat-prevention/create-threat-exceptions

juan_LOption: B
Sep 11, 2022

B - Easy: Just see GUI capture https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/dita/_graphics/9-1/threat-prevention/threat-exception-antispyware.png/jcr:content/renditions/original

nose999
Sep 13, 2022

I chose D as this threat in the question is specifically a DNS threat so you follow Step 3

DrNick0Option: A
Sep 20, 2022

Correct answer is A, enable a specific signature, change the default action from reset both to allow and commit. https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClcrCAC

MetgatzOption: D
Dec 20, 2023

spyware category: dns-c2 - Option D

Sammy3637Option: D
Dec 21, 2023

DNS Exceptions for sure !

MarshpillowzOption: D
Feb 3, 2024

D is correct