Palo Alto Networks XSIAM Analyst Questions and Answers
Which attributes can be used as featured fields?
Which attribution evidence will have the lowest confidence level when evaluating assets to determine if they belong to an organization’s attack surface?
Which Cytool command will re-enable protection on an endpoint that has Cortex XDR agent protection paused?
When a sub-playbook loops, which task tab will allow an analyst to determine what data the sub-playbook used in each iteration of the loop?
Which statement applies to a low-severity alert when a playbook trigger has been configured?
What is the cause when alerts generated by a correlation rule are not creating an incident?
Which two statements apply to IOC rules? (Choose two)
For a critical incident, Cortex XSIAM suggests several playbooks which should have been executed automatically.
Why were the playbooks not executed?
SCENARIO:
A security analyst has been assigned a ticket from the help desk stating that users are experiencing errors when attempting to open files on a specific network share. These errors state that the file format cannot be opened. IT has verified that the file server is online and functioning, but that all files have unusual extensions attached to them.
The security analyst reviews alerts within Cortex XSIAM and identifies malicious activity related to a possible ransomware attack on the file server. This incident is then escalated to the incident response team for further investigation.
Upon reviewing the incident, the responders confirm that ransomware was successfully executed on the file server. Other details of the attack are noted below:
• An unpatched vulnerability on an externally facing web server was exploited for initial access
• The attackers successfully used Mimikatz to dump sensitive credentials that were used for privilege escalation
• PowerShell was used on a Windows server for additional discovery, as well as lateral movement to other systems
• The attackers executed SystemBC RAT on multiple systems to maintain remote access
• Ransomware payload was downloaded on the file server via an external site "file io"
QUESTION STATEMENT:
Which forensics artifact collected by Cortex XSIAM will help the responders identify what the attackers were looking for during the discovery phase of the attack?
Based on the image below, which two determinations can be made from the causality chain? (Choose two.)
In addition to defining the Rule Name and Severity Level, which step or set of steps accurately reflects how an analyst should configure an indicator prevention rule before reviewing and saving it?
How would Incident Context be referenced in an alert War Room task or alert playbook task?
A security analyst is reviewing alerts and incidents associated with internal vulnerability scanning performed by the security operations team.
Which built-in incident domain will be assigned to these alerts and incidents in Cortex XSIAM?
An on-demand malware scan of a Windows workstation using the Cortex XDR agent is successful and detects three malicious files. An analyst attempts further investigation of the files by right-clicking on the scan result, selecting "Additional data," then "View related alerts," but no alerts are reported.
What is the reason for this outcome?
Based on the artifact details in the image below, what can an analyst infer from the hexagon-shaped object with the exclamation mark (!) at the center?