Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Paloalto Networks XDR-Analyst Palo Alto Networks XDR Analyst Exam Practice Test

Page: 1 / 9
Total 91 questions

Palo Alto Networks XDR Analyst Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

To stop a network-based attack, any interference with a portion of the attack pattern is enough to prevent it from succeeding. Which statement is correct regarding the Cortex XDR Analytics module?

Options:

A.

It does not interfere with any portion of the pattern on the endpoint.

B.

It interferes with the pattern as soon as it is observed by the firewall.

C.

It does not need to interfere with the any portion of the pattern to prevent the attack.

D.

It interferes with the pattern as soon as it is observed on the endpoint.

Question 2

What is the purpose of the Cortex Data Lake?

Options:

A.

a local storage facility where your logs and alert data can be aggregated

B.

a cloud-based storage facility where your firewall logs are stored

C.

the interface between firewalls and the Cortex XDR agents

D.

the workspace for your Cortex XDR agents to detonate potential malware files

Question 3

What is the purpose of the Unit 42 team?

Options:

A.

Unit 42 is responsible for automation and orchestration of products

B.

Unit 42 is responsible for the configuration optimization of the Cortex XDR server

C.

Unit 42 is responsible for threat research, malware analysis and threat hunting

D.

Unit 42 is responsible for the rapid deployment of Cortex XDR agents

Question 4

What contains a logical schema in an XQL query?

Options:

A.

Bin

B.

Array expand

C.

Field

D.

Dataset

Question 5

In the Cortex XDR console, from which two pages are you able to manually perform the agent upgrade action? (Choose two.)

Options:

A.

Asset Management

B.

Agent Installations

C.

Action Center

D.

Endpoint Administration

Question 6

What kind of the threat typically encrypts user files?

Options:

A.

ransomware

B.

SQL injection attacks

C.

Zero-day exploits

D.

supply-chain attacks

Question 7

How does Cortex XDR agent for Windows prevent ransomware attacks from compromising the file system?

Options:

A.

by encrypting the disk first.

B.

by utilizing decoy Files.

C.

by retrieving the encryption key.

D.

by patching vulnerable applications.

Question 8

Phishing belongs to which of the following MITRE ATT&CK tactics?

Options:

A.

Initial Access, Persistence

B.

Persistence, Command and Control

C.

Reconnaissance, Persistence

D.

Reconnaissance, Initial Access

Question 9

When reaching out to TAC for additional technical support related to a Security Event; what are two critical pieces of information you need to collect from the Agent? (Choose Two)

Options:

A.

The agent technical support file.

B.

The prevention archive from the alert.

C.

The distribution id of the agent.

D.

A list of all the current exceptions applied to the agent.

E.

The unique agent id.

Question 10

Which statement is true for Application Exploits and Kernel Exploits?

Options:

A.

The ultimate goal of any exploit is to reach the application.

B.

Kernel exploits are easier to prevent then application exploits.

C.

The ultimate goal of any exploit is to reach the kernel.

D.

Application exploits leverage kernel vulnerability.

Question 11

Which statement is correct based on the report output below?

Options:

A.

Host Inventory Data Collection is enabled.

B.

3,297 total incidents have been detected.

C.

Forensic inventory data collection is enabled.

D.

133 agents have full disk encryption.

Question 12

The Cortex XDR console has triggered an incident, blocking a vitally important piece of software in your organization that is known to be benign. Which of the following options would prevent Cortex XDR from blocking this software in the future, for all endpoints in your organization?

Options:

A.

Create an individual alert exclusion.

B.

Create a global inclusion.

C.

Create an endpoint-specific exception.

D.

Create a global exception.

Question 13

What is the purpose of targeting software vendors in a supply-chain attack?

Options:

A.

to take advantage of a trusted software delivery method.

B.

to steal users’ login credentials.

C.

to access source code.

D.

to report Zero-day vulnerabilities.

Question 14

In Cortex XDR management console scheduled reports can be forwarded to which of the following applications/services?

Options:

A.

Salesforce

B.

Jira

C.

Service Now

D.

Slack

Question 15

Cortex XDR Analytics can alert when detecting activity matching the following MITRE ATT&CKTM techniques.

Options:

A.

Exfiltration, Command and Control, Collection

B.

Exfiltration, Command and Control, Privilege Escalation

C.

Exfiltration, Command and Control, Impact

D.

Exfiltration, Command and Control, Lateral Movement

Question 16

When using the “File Search and Destroy” feature, which of the following search hash type is supported?

Options:

A.

SHA256 hash of the file

B.

AES256 hash of the file

C.

MD5 hash of the file

D.

SHA1 hash of the file

Question 17

When creating a scheduled report which is not an option?

Options:

A.

Run weekly on a certain day and time.

B.

Run quarterly on a certain day and time.

C.

Run monthly on a certain day and time.

D.

Run daily at a certain time (selectable hours and minutes).

Question 18

What types of actions you can execute with live terminal session?

Options:

A.

Manage Network configurations, Quarantine Files, Run PowerShell scripts

B.

Manage Processes, Manage Files, Run Operating System Commands, Run Ruby Commands and Scripts

C.

Apply patches, Reboot System, send notification for end user, Run Python Commands and Scripts

D.

Manage Processes, Manage Files, Run Operating System Commands, Run Python Commands and Scripts

Question 19

When is the wss (WebSocket Secure) protocol used?

Options:

A.

when the Cortex XDR agent downloads new security content

B.

when the Cortex XDR agent uploads alert data

C.

when the Cortex XDR agent connects to WildFire to upload files for analysis

D.

when the Cortex XDR agent establishes a bidirectional communication channel

Question 20

Which of the following protection modules is checked first in the Cortex XDR Windows agent malware protection flow?

Options:

A.

Hash Verdict Determination

B.

Behavioral Threat Protection

C.

Restriction Policy

D.

Child Process Protection

Question 21

Which engine, of the following, in Cortex XDR determines the most relevant artifacts in each alert and aggregates all alerts related to an event into an incident?

Options:

A.

Sensor Engine

B.

Causality Analysis Engine

C.

Log Stitching Engine

D.

Causality Chain Engine

Question 22

What is the Wildfire analysis file size limit for Windows PE files?

Options:

A.

No Limit

B.

500MB

C.

100MB

D.

1GB

Question 23

Which license is required when deploying Cortex XDR agent on Kubernetes Clusters as a DaemonSet?

Options:

A.

Cortex XDR Pro per TB

B.

Host Insights

C.

Cortex XDR Pro per Endpoint

D.

Cortex XDR Cloud per Host

Question 24

How can you pivot within a row to Causality view and Timeline views for further investigate?

Options:

A.

Using the Open Card Only

B.

Using the Open Card and Open Timeline actions respectively

C.

You can't pivot within a row to Causality view and Timeline views

D.

Using Open Timeline Actions Only

Question 25

Which statement best describes how Behavioral Threat Protection (BTP) works?

Options:

A.

BTP injects into known vulnerable processes to detect malicious activity.

B.

BTP runs on the Cortex XDR and distributes behavioral signatures to all agents.

C.

BTP matches EDR data with rules provided by Cortex XDR.

D.

BTP uses machine Learning to recognize malicious activity even if it is not known.

Question 26

While working the alerts involved in a Cortex XDR incident, an analyst has found that every alert in this incident requires an exclusion. What will the Cortex XDR console automatically do to this incident if all alerts contained have exclusions?

Options:

A.

mark the incident as Unresolved

B.

create a BIOC rule excluding this behavior

C.

create an exception to prevent future false positives

D.

mark the incident as Resolved – False Positive

Question 27

After scan, how does file quarantine function work on an endpoint?

Options:

A.

Quarantine takes ownership of the files and folders and prevents execution through access control.

B.

Quarantine disables the network adapters and locks down access preventing any communications with the endpoint.

C.

Quarantine removes a specific file from its location on a local or removable drive to a protected folder and prevents it from being executed.

D.

Quarantine prevents an endpoint from communicating with anything besides the listed exceptions in the agent profile and Cortex XDR.

Page: 1 / 9
Total 91 questions