exam questions

Exam PCDRA All Questions

View all questions & answers for the PCDRA exam

Exam PCDRA topic 1 question 50 discussion

Actual exam question from Palo Alto Networks's PCDRA
Question #: 50
Topic #: 1
[All PCDRA Questions]

Where would you go to add an exception to exclude a specific file hash from examination by the Malware profile for a Windows endpoint?

  • A. Find the Malware profile attached to the endpoint, Under Portable Executable and DLL Examination add the hash to the allow list.
  • B. From the rules menu select new exception, fill out the criteria, choose the scope to apply it to, hit save.
  • C. Find the exceptions profile attached to the endpoint, under process exceptions select local analysis, paste the hash and save.
  • D. In the Action Center, choose Allow list, select new action, select add to allow list, add your hash to the list, and apply it.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Zubair2131
4 months, 1 week ago
It's B as its only asking create an exception for Windows Endpoint.Can't be D as it will create exeption for all endpoint regardless of the Platform Type.
upvoted 1 times
...
darylmaeb24
7 months, 3 weeks ago
I will go for D
upvoted 3 times
...
deyabeel22
8 months, 3 weeks ago
D: Investigate Files: You can manage file execution on your endpoints by using file hashes that are included in your allow and block lists. If you trust a certain file and know it to be benign, you can add the file hash to the allow list and allow it to be executed on all your endpoints regardless of the WildFire or local analysis verdict. Similarly, if you want to always block a file from running on any of your endpoints, you can add the associated hash to the block list.
upvoted 3 times
...
sharkk43
8 months, 3 weeks ago
I say B based on: https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Prevent-Administrator-Guide/Add-an-IOC-or-BIOC-Rule-Exception "If you want to create a rule to take action on specific behaviors but also want to exclude one or more indicators from the rule, you can create an IOC or BIOC rule exception. An indicator can include the SHA256 hash of a process, process name, process path, vendor name, user name, causality group owner (CGO) full path, or process command-line arguments. For more information about these indicators, see Rules. For each exception, you also specify the rule scope to which the exception applies." "Select Settings → Exception Configuration → IOC/BIOC Suppression Rules. Click + New Exception. Specify a Rule Name and an optional Description. etc."
upvoted 3 times
...
_tips
10 months, 1 week ago
Selected Answer: D
2.3.3 Outline malware protection flow https://www.paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/datasheets/education/pcdra-study-guide.pdf Hash exception - A hash exception enables you to override the verdict for a specific file without affecting the settings in your Malware Security profile. The Hash Exception policy is evaluated first and takes precedence over all other methods to determine the hash verdict. The exception does not allow Hash value
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago