Palo Alto Networks Systems Engineer Professional - Cortex Questions and Answers
A test for a Microsoft exploit has been planned. After some research Internet Explorer 11 CVE-2016-0189 has been selected and a module in Metasploit has been identified
(exploit/windows/browser/ms16_051_vbscript)
The description and current configuration of the exploit are as follows;
What is the remaining configuration?
A)
B)
C)
D)
A Cortex XSIAM customer is unable to access their Cortex XSIAM tenant.
Which resource can the customer use to validate the uptime of Cortex XSIAM?
A General Purpose Dynamic Section can be added to which two layouts for incident types? (Choose two)
How does DBot score an indicator that has multiple reputation scores?
A customer has purchased Cortex XDR and requires 24/7 monitoring of the platform. However, the customer only has staff available during business hours.
Which Palo Alto Networks offering would best meet this requirement?
How can Cortex XSOAR save time when a phishing incident occurs?
What are two reasons incident investigation is needed in Cortex XDR? (Choose two.)
A prospective customer is interested in Cortex XDR but is enable to run a product evaluation.
Which tool can be used instead to showcase Cortex XDR?
For which two purposes can Cortex XSOAR engines be deployed? (Choose two.)
How does Cortex XSOAR automation save time when a phishing incident occurs?
When preparing the golden image in a Cortex XDR Virtual Desktop Infrastructure (VDI) deployment, which step is required?
Which two filter operators are available in Cortex XDR? (Choose two.)
What allows the use of predetermined Palo Alto Networks roles to assign access rights to Cortex XDR users?
When running a Cortex XSIAM proof of value (POV), why is it important to deploy the Cortex XDR agent?
A customer has purchased Cortex XSOAR and has a need to rapidly stand up the product in their environment. The customer has stated that their internal staff are currently occupied with other projects.
Which Palo Alto Networks service offering should be recommended to the customer?
When analyzing logs for indicators, which are used for only BIOC identification'?
Which source provides data for Cortex XDR?
Which type of log is ingested natively in Cortex XDR Pro per TB?
A customer wants to modify the retention periods of their Threat logs in Cortex Data Lake.
Where would the user configure the ratio of storage for each log type?
A Cortex Xpanse customer receives an email regarding an upcoming product update and wants to get more information on the new features.
In which resource can the customer access this information?
What is a benefit of user entity behavior analytics (UEBA) over security information and event management (SIEM)?
Which two actions are required to add indicators to the whitelist? (Choose two.)
The images show two versions of the same automation script and the results they produce when executed in Demisto. What are two possible causes of the exception thrown in the second Image? (Choose two.)
SUCCESS
An antivirus refresh project was initiated by the IT operations executive. Who is the best source for discussion about the project's operational considerations'?
In addition to incident volume, which four critical factors must be evaluated to determine effectiveness and ROI on cybersecurity planning and technology?
In an Air-Gapped environment where the Docker package was manually installed after the Cortex XSOAR installation which action allows Cortex XSOAR to access Docker?
A Cortex XSOAR customer wants to send a survey to users asking them to input their manager's email for a training use case so the manager can receive status reports on the employee's training. However, the customer is concerned users will provide incorrect information to avoid sending status updates to their manager.
How can Cortex XSOAR most efficiently sanitize user input prior to using the responses in the playbook?
In Cortex XDR Prevent, which three matching criteria can be used to dynamically group endpoints? (Choose three )
What are the key capabilities of the ASM for Remote Workers module?
Which feature of Cortex XSIAM displays an entire picture of an attack, including the originating process or delivery point?
Why is it important to document notes from the Proof of Value (POV) for post-sales hand off?
What is a requirement when integrating Cortex XSIAM or Cortex XDR with other Palo Alto Networks products?
What is the function of reputation scoring in the Threat Intelligence Module of Cortex XSIAM?
What must a customer deploy prior to collecting endpoint data in Cortex XSIAM?
The certificate used for decryption was installed as a trusted toot CA certificate to ensure communication between the Cortex XDR Agent and Cortex XDR Management Console. What action needs to be taken if the administrator determines the Cortex XDR Agents are not communicating with the Cortex XDR Management Console?
Which feature of Cortex Xpanse allows it to identify previously unknown assets?
Which statement applies to the malware protection flow in Cortex XDR Prevent?
What does the Cortex XSOAR "Saved by Dbot" widget calculate?
Which three Demisto incident type features can be customized under Settings > Advanced > Incident Types? (Choose three.)
If you have a playbook task that errors out. where could you see the output of the task?
What does DBot use to score an indicator that has multiple reputation scores?
Which two methods does the Cortex XDR agent use to identify malware during a scheduled scan? (Choose two.)
A Cortex XSOAR customer has a phishing use case in which a playbook has been implemented with one of the steps blocking a malicious URL found in an email reported by one of the users.
What would be the appropriate next step in the playbook?
An administrator of a Cortex XDR protected production environment would like to test its ability to protect users from a known flash player exploit.
What is the safest way to do it?
Approximately how many Cortex XSOAR marketplace integrations exist?
Which Linux OS command will manually load Docker images onto the Cortex XSOAR server in an air-gapped environment?
Which two types of indicators of compromise (IOCs) are available for creation in Cortex XDR? (Choose two.)
Which service helps identify attackers by combining world-class threat intelligence with Cortex XSIAM technology?
Rearrange the steps into the correct order for modifying an incident layout.
Which two types of lOCs are available for creation in Cortex XDR? (Choose two.)