Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Paloalto Networks XDR-Engineer Dumps

Palo Alto Networks XDR Engineer Questions and Answers

Question 1

What should be configured in Cortex XDR to integrate asset data from Microsoft Azure for better visibility and incident investigation?

Options:

A.

Azure Network Watcher

B.

Cloud Identity Engine

C.

Cloud Inventory

D.

Microsoft 365

Question 2

Which components may be included in a Cortex XDR content update?

Options:

A.

Device control profiles, agent versions, and kernel support

B.

Behavioral Threat Protection (BTP) rules and local analysis logic

C.

Antivirus definitions and agent versions

D.

Firewall rules and antivirus definitions

Question 3

How long is data kept in the temporary hot storage cache after being queried from cold storage?

Options:

A.

1 hour, re-queried to a maximum of 12 hours

B.

24 hours, re-queried to a maximum of 7 days

C.

24 hours, re-queried to a maximum of 14 days

D.

1 hour, re-queried to a maximum of 24 hours

Question 4

An insider compromise investigation has been requested to provide evidence of an unauthorized removable drive being mounted on a company laptop. Cortex XDR agent is installed with default prevention agent settings profile and default extension "Device Configuration" profile. Where can an engineer find the evidence?

Options:

A.

Check Host Inventory -> Mounts

B.

dataset = xdr_data | filter event_type = ENUM.MOUNT and event_sub_type = ENUM.MOUNT_DRIVE_MOUNT

C.

The requested data requires additional configuration to be captured

D.

preset = device_control

Question 5

Which method will drop undesired logs and reduce the amount of data being ingested?

Options:

A.

[COLLECT:vendor="vendor", product="product", target_brokers="", no_hit=drop] * drop _raw_log contains "undesired logs";

B.

[INGEST:vendor="vendor", product="product", target_dataset="vendor_product_raw",no_hit=drop] * filter _raw_log not contains "undesired logs";

C.

[COLLECT:vendor="vendor", product="product", target_dataset="", no_hit=drop] * drop _raw_log contains "undesired logs";

D.

[INGEST:vendor="vendor", product="product", target_brokers="vendor_product_raw", no_hit=keep] * filter _raw_log not contains "undesired logs";

Question 6

Log events from a previously deployed Windows XDR Collector agent are no longer being observed in the console after an OS upgrade. Which aspect of the log events is the probable cause of this behavior?

Options:

A.

They are greater than 5MB

B.

They are in Winlogbeat format

C.

They are in Filebeat format

D.

They are less than 1MB

Question 7

Using the Cortex XDR console, how can additional network access be allowed from a set of IP addresses to an isolated endpoint?

Options:

A.

Add entries in Configuration section of Security Settings

B.

Add entries in the Allowed Domains section of Security Settings for the tenant

C.

Add entries in Exceptions Configuration section of Isolation Exceptions

D.

Add entries in Response Actions section of Agent Settings profile

Question 8

How can a Malware profile be configured to prevent a specific executable from being uploaded to the cloud?

Options:

A.

Disable on-demand file examination for the executable

B.

Set PE and DLL examination for the executable to report action mode

C.

Add the executable to the allow list for executions

D.

Create an exclusion rule for the executable

Question 9

What will enable a custom prevention rule to block specific behavior?

Options:

A.

A correlation rule added to an Agent Blocking profile

B.

A custom behavioral indicator of compromise (BIOC) added to an Exploit profile

C.

A custom behavioral indicator of compromise (BIOC) added to a Restriction profile

D.

A correlation rule added to a Malware profile

Question 10

A static endpoint group is created by adding 321 endpoints using the Upload From File feature. However, after group creation, the members count field shows 244 endpoints. What are two possible reasons why endpoints were not added to the group? (Choose two.)

Options:

A.

Static groups have a limit of 250 endpoints when adding by file

B.

Endpoints added to the new group were previously added to an existing group

C.

Endpoints added to the group were in Disconnected or Connection Lost status when groupmembership was added

D.

The IP address, hostname, or alias of the endpoints must match an existing agent that has registered with the tenant

Question 11

Which configuration profile option with an available built-in template can be applied to both Windows and Linux systems by using XDR Collector?

Options:

A.

Filebeat

B.

HTTP Collector template

C.

XDR Collector settings

D.

Winlogbeat

Question 12

Which two steps should be considered when configuring the Cortex XDR agent for a sensitive and highly regulated environment? (Choose two.)

Options:

A.

Enable critical environment versions

B.

Create an agent settings profile where the agent upgrade scope is maintenance releases only

C.

Create an agent settings profile, enable content auto-update, and include a delay of four days

D.

Enable minor content version updates

Question 13

A correlation rule is created to detect potential insider threats by correlating user login events from one dataset with file access events from another dataset. The rule must retain all user login events, even if there are no matching file access events, to ensure no login activity is missed.

text

Copy

dataset = x

| join (dataset = y)

Which type of join is required to maintain all records from dataset x, even if there are no matching events from dataset y?

Options:

A.

Inner

B.

Left

C.

Right

D.

Outer

Question 14

An XDR engineer is configuring an automation playbook to respond to high-severity malware alerts by automatically isolating the affected endpoint and notifying the security team via email. The playbook should only trigger for alerts generated by the Cortex XDR analytics engine, not custom BIOCs. Which two conditions should the engineer include in the playbook trigger to meet these requirements? (Choose two.)

Options:

A.

Alert severity is High

B.

Alert source is Cortex XDR Analytics

C.

Alert category is Malware

D.

Alert status is New

Question 15

During a recent internal purple team exercise, the following recommendation is given to the detection engineering team: Detect and prevent command line invocation of Python on Windows endpoints by non-technical business units. Which rule type should be implemented?

Options:

A.

Analytics Behavioral Indicator of Compromise (ABIOC)

B.

Behavioral Indicator of Compromise (BIOC)

C.

Correlation

D.

Indicator of Compromise (IOC)

Page: 1 / 5
Total 50 questions