New Year Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Paloalto Networks XDR-Analyst Dumps

Page: 1 / 9
Total 91 questions

Palo Alto Networks XDR Analyst Questions and Answers

Question 1

In incident-related widgets, how would you filter the display to only show incidents that were “starred”?

Options:

A.

Create a custom XQL widget

B.

This is not currently supported

C.

Create a custom report and filter on starred incidents

D.

Click the star in the widget

Question 2

When viewing the incident directly, what is the “assigned to” field value of a new Incident that was just reported to Cortex?

Options:

A.

Pending

B.

It is blank

C.

Unassigned

D.

New

Question 3

Network attacks follow predictable patterns. If you interfere with any portion of this pattern, the attack will be neutralized. Which of the following statements is correct?

Options:

A.

Cortex XDR Analytics allows to interfere with the pattern as soon as it is observed on the firewall.

B.

Cortex XDR Analytics does not interfere with the pattern as soon as it is observed on the endpoint.

C.

Cortex XDR Analytics does not have to interfere with the pattern as soon as it is observed on the endpoint in order to prevent the attack.

D.

Cortex XDR Analytics allows to interfere with the pattern as soon as it is observed on the endpoint.

Question 4

Which engine, of the following, in Cortex XDR determines the most relevant artifacts in each alert and aggregates all alerts related to an event into an incident?

Options:

A.

Sensor Engine

B.

Causality Analysis Engine

C.

Log Stitching Engine

D.

Causality Chain Engine

Question 5

Which of the following represents the correct relation of alerts to incidents?

Options:

A.

Only alerts with the same host are grouped together into one Incident in a given time frame.

B.

Alerts that occur within a three-hour time frame are grouped together into one Incident.

C.

Alerts with same causality chains that occur within a given time frame are grouped together into an Incident.

D.

Every alert creates a new Incident.

Question 6

Why would one threaten to encrypt a hypervisor or, potentially, a multiple number of virtual machines running on a server?

Options:

A.

To extort a payment from a victim or potentially embarrass the owners.

B.

To gain notoriety and potentially a consulting position.

C.

To better understand the underlying virtual infrastructure.

D.

To potentially perform a Distributed Denial of Attack.

Question 7

What kind of malware uses encryption, data theft, denial of service, and possibly harassment to take advantage of a victim?

Options:

A.

Ransomware

B.

Worm

C.

Keylogger

D.

Rootkit

Question 8

While working the alerts involved in a Cortex XDR incident, an analyst has found that every alert in this incident requires an exclusion. What will the Cortex XDR console automatically do to this incident if all alerts contained have exclusions?

Options:

A.

mark the incident as Unresolved

B.

create a BIOC rule excluding this behavior

C.

create an exception to prevent future false positives

D.

mark the incident as Resolved – False Positive

Question 9

What is the difference between presets and datasets in XQL?

Options:

A.

A dataset is a Cortex data lake data source only; presets are built-in data source.

B.

A dataset is a built-in or third-party source; presets group XDR data fields.

C.

A dataset is a database; presets is a field.

D.

A dataset is a third-party data source; presets are built-in data source.

Question 10

When using the “File Search and Destroy” feature, which of the following search hash type is supported?

Options:

A.

SHA256 hash of the file

B.

AES256 hash of the file

C.

MD5 hash of the file

D.

SHA1 hash of the file

Question 11

Which of the following paths will successfully activate Remediation Suggestions?

Options:

A.

Incident View > Actions > Remediation Suggestions

B.

Causality View > Actions > Remediation Suggestions

C.

Alerts Table > Right-click on a process node > Remediation Suggestions

D.

Alerts Table > Right-click on an alert > Remediation Suggestions

Question 12

Which of the following best defines the Windows Registry as used by the Cortex XDR agent?

Options:

A.

a hierarchical database that stores settings for the operating system and for applications

B.

a system of files used by the operating system to commit memory that exceeds the available hardware resources. Also known as the “swap”

C.

a central system, available via the internet, for registering officially licensed versions of software to prove ownership

D.

a ledger for maintaining accurate and up-to-date information on total disk usage and disk space remaining available to the operating system

Question 13

Which profiles can the user use to configure malware protection in the Cortex XDR console?

Options:

A.

Malware Protection profile

B.

Malware profile

C.

Malware Detection profile

D.

Anti-Malware profile

Question 14

An attacker tries to load dynamic libraries on macOS from an unsecure location. Which Cortex XDR module can prevent this attack?

Options:

A.

DDL Security

B.

Hot Patch Protection

C.

Kernel Integrity Monitor (KIM)

D.

Dylib Hijacking

Question 15

As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to open a malicious Word document. You learn from the WildFire report and AutoFocus that this document is known to have been used in Phishing campaigns since 2018. What steps can you take to ensure that the same document is not opened by other users in your organization protected by the Cortex XDR agent?

Options:

A.

Enable DLL Protection on all endpoints but there might be some false positives.

B.

Create Behavioral Threat Protection (BTP) rules to recognize and prevent the activity.

C.

No step is required because Cortex shares IOCs with our fellow Cyber Threat Alliance members.

D.

No step is required because the malicious document is already stopped.

Question 16

Live Terminal uses which type of protocol to communicate with the agent on the endpoint?

Options:

A.

NetBIOS over TCP

B.

WebSocket

C.

UDP and a random port

D.

TCP, over port 80

Question 17

What functionality of the Broker VM would you use to ingest third-party firewall logs to the Cortex Data Lake?

Options:

A.

Netflow Collector

B.

Syslog Collector

C.

DB Collector

D.

Pathfinder

Question 18

In Windows and macOS you need to prevent the Cortex XDR Agent from blocking execution of a file based on the digital signer. What is one way to add an exception for the singer?

Options:

A.

In the Restrictions Profile, add the file name and path to the Executable Files allow list.

B.

Create a new rule exception and use the singer as the characteristic.

C.

Add the signer to the allow list in the malware profile.

D.

Add the signer to the allow list under the action center page.

Question 19

Which function describes the removal of a specific file from its location on a local or removable drive to a protected folder to prevent the file from being executed?

Options:

A.

Search & destroy

B.

Isolation

C.

Quarantine

D.

Flag for removal

Question 20

Which of the following protection modules is checked first in the Cortex XDR Windows agent malware protection flow?

Options:

A.

Hash Verdict Determination

B.

Behavioral Threat Protection

C.

Restriction Policy

D.

Child Process Protection

Question 21

When creating a scheduled report which is not an option?

Options:

A.

Run weekly on a certain day and time.

B.

Run quarterly on a certain day and time.

C.

Run monthly on a certain day and time.

D.

Run daily at a certain time (selectable hours and minutes).

Question 22

What motivation do ransomware attackers have for returning access to systems once their victims have paid?

Options:

A.

There is organized crime governance among attackers that requires the return of access to remain in good standing. B. Nation-states enforce the return of system access through the use of laws and regulation.

B.

Failure to restore access to systems undermines the scheme because others will not believe their valuables would be returned.

C.

The ransomware attackers hope to trace the financial trail back and steal more from traditional banking institutions. -

Question 23

What is the function of WildFire for Cortex XDR?

Options:

A.

WildFire runs in the cloud and analyses alert data from the XDR agent to check for behavioural threats.

B.

WildFire is the engine that runs on the local agent and determines whether behavioural threats are occurring on the endpoint.

C.

WildFire accepts and analyses a sample to provide a verdict.

D.

WildFire runs entirely on the agent to quickly analyse samples and provide a verdict.

Question 24

How can you pivot within a row to Causality view and Timeline views for further investigate?

Options:

A.

Using the Open Card Only

B.

Using the Open Card and Open Timeline actions respectively

C.

You can't pivot within a row to Causality view and Timeline views

D.

Using Open Timeline Actions Only

Question 25

What types of actions you can execute with live terminal session?

Options:

A.

Manage Network configurations, Quarantine Files, Run PowerShell scripts

B.

Manage Processes, Manage Files, Run Operating System Commands, Run Ruby Commands and Scripts

C.

Apply patches, Reboot System, send notification for end user, Run Python Commands and Scripts

D.

Manage Processes, Manage Files, Run Operating System Commands, Run Python Commands and Scripts

Question 26

What is the purpose of the Cortex Data Lake?

Options:

A.

a local storage facility where your logs and alert data can be aggregated

B.

a cloud-based storage facility where your firewall logs are stored

C.

the interface between firewalls and the Cortex XDR agents

D.

the workspace for your Cortex XDR agents to detonate potential malware files

Question 27

Which of the following is NOT a precanned script provided by Palo Alto Networks?

Options:

A.

delete_file

B.

quarantine_file

C.

process_kill_name

D.

list_directories

Page: 1 / 9
Total 91 questions