Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Paloalto Networks XDR-Engineer Palo Alto Networks XDR Engineer Exam Practice Test

Palo Alto Networks XDR Engineer Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

What should be configured in Cortex XDR to integrate asset data from Microsoft Azure for better visibility and incident investigation?

Options:

A.

Azure Network Watcher

B.

Cloud Identity Engine

C.

Cloud Inventory

D.

Microsoft 365

Question 2

Log events from a previously deployed Windows XDR Collector agent are no longer being observed in the console after an OS upgrade. Which aspect of the log events is the probable cause of this behavior?

Options:

A.

They are greater than 5MB

B.

They are in Winlogbeat format

C.

They are in Filebeat format

D.

They are less than 1MB

Question 3

Which XQL query can be saved as a behavioral indicator of compromise (BIOC) rule, then converted to a custom prevention rule?

Options:

A.

dataset = xdr_data

| filter event_type = ENUM.DEVICE and action_process_image_name = "**"

and action_process_image_command_line = "-e cmd*"

and action_process_image_command_line != "*cmd.exe -a /c*"

B.

dataset = xdr_data

| filter event_type = ENUM.PROCESS and event_type = ENUM.DEVICE and action_process_image_name = "**"

and action_process_image_command_line = "-e cmd*"

and action_process_image_command_line != "*cmd.exe -a /c*"

C.

dataset = xdr_data

| filter event_type = FILE and (event_sub_type = FILE_CREATE_NEW or event_sub_type = FILE_WRITE or event_sub_type = FILE_REMOVE or event_sub_type = FILE_RENAME) and agent_hostname = "hostname"

| filter lowercase(action_file_path) in ("/etc/*", "/usr/local/share/*", "/usr/share/*") and action_file_extension in ("conf", "txt")

| fields action_file_name, action_file_path, action_file_type, agent_ip_a

D.

dataset = xdr_data

| filter event_type = ENUM.PROCESS and action_process_image_name = "**"

and action_process_image_command_line = "-e cmd*"

and action_process_image_command_line != "*cmd.exe -a /c*"

Question 4

How can a Malware profile be configured to prevent a specific executable from being uploaded to the cloud?

Options:

A.

Disable on-demand file examination for the executable

B.

Set PE and DLL examination for the executable to report action mode

C.

Add the executable to the allow list for executions

D.

Create an exclusion rule for the executable

Question 5

A security audit determines that the Windows Cortex XDR host-based firewall is not blocking outbound RDP connections for certain remote workers. The audit report confirms the following:

    All devices are running healthy Cortex XDR agents.

    A single host-based firewall rule to block all outbound RDP is implemented.

    The policy hosting the profile containing the rule applies to all Windows endpoints.

    The logic within the firewall rule is adequate.

    Further testing concludes RDP is successfully being blocked on all devices tested at company HQ.

    Network location configuration in Agent Settings is enabled on all Windows endpoints.What is the likely reason the RDP connections are not being blocked?

Options:

A.

The profile's default action for outbound traffic is set to Allow

B.

The pertinent host-based firewall rule group is only applied to external rule groups

C.

Report mode is set to Enabled in the report settings under the profile configuration

D.

The pertinent host-based firewall rule group is only applied to internal rule groups

Question 6

A query is created that will run weekly via API. After it is tested and ready, it is reviewed in the Query Center. Which available column should be checked to determine how many compute units will be used when the query is run?

Options:

A.

Query Status

B.

Compute Unit Usage

C.

Simulated Compute Units

D.

Compute Unit Quota

Question 7

An administrator wants to employ reusable rules within custom parsing rules to apply consistent log field extraction across multiple data sources. Which section of the parsing rule should the administrator use to define those reusable rules in Cortex XDR?

Options:

A.

RULE

B.

INGEST

C.

FILTER

D.

CONST

Question 8

In addition to using valid authentication credentials, what is required to enable the setup of the Database Collector applet on the Broker VM to ingest database activity?

Options:

A.

Valid SQL query targeting the desired data

B.

Access to the database audit log

C.

Database schema exported in the correct format

D.

Access to the database transaction log

Question 9

Based on the image of a validated false positive alert below, which action is recommended for resolution?

Options:

A.

Create an alert exclusion for OUTLOOK.EXE

B.

Disable an action to the CGO Process DWWIN.EXE

C.

Create an exception for the CGO DWWIN.EXE for ROP Mitigation Module

D.

Create an exception for OUTLOOK.EXE for ROP Mitigation Module

Question 10

An engineer wants to automate the handling of alerts in Cortex XDR and defines several automation rules with different actions to be triggered based on specific alert conditions. Some alerts do not trigger the automation rules as expected. Which statement explains why the automation rules might not apply to certain alerts?

Options:

A.

They are executed in sequential order, so alerts may not trigger the correct actions if the rules are not configured properly

B.

They only apply to new alerts grouped into incidents by the system and only alerts that generateincidents trigger automation actions

C.

They can only be triggered by alerts with high severity; alerts with low or informational severity will not trigger the automation rules

D.

They can be applied to any alert, but they only work if the alert is manually grouped into an incident by the analyst

Question 11

An analyst considers an alert with the category of lateral movement to be allowed and not needing to be checked in the future. Based on the image below, which action can an engineer take to address the requirement?

Options:

A.

Create a behavioral indicator of compromise (BIOC) suppression rule for the parent process and the specific BIOC: Lateral movement

B.

Create an alert exclusion rule by using the alert source and alert name

C.

Create a disable injection and prevention rule for the parent process indicated in the alert

D.

Create an exception rule for the parent process and the exact command indicated in the alert

Question 12

After deploying Cortex XDR agents to a large group of endpoints, some of the endpoints have a partially protected status. In which two places can insights into what is contributing to this status be located? (Choose two.)

Options:

A.

Management Audit Logs

B.

XQL query of the endpoints dataset

C.

All Endpoints page

D.

Asset Inventory

Question 13

Which method will drop undesired logs and reduce the amount of data being ingested?

Options:

A.

[COLLECT:vendor="vendor", product="product", target_brokers="", no_hit=drop] * drop _raw_log contains "undesired logs";

B.

[INGEST:vendor="vendor", product="product", target_dataset="vendor_product_raw",no_hit=drop] * filter _raw_log not contains "undesired logs";

C.

[COLLECT:vendor="vendor", product="product", target_dataset="", no_hit=drop] * drop _raw_log contains "undesired logs";

D.

[INGEST:vendor="vendor", product="product", target_brokers="vendor_product_raw", no_hit=keep] * filter _raw_log not contains "undesired logs";

Question 14

Some company employees are able to print documents when working from home, but not on network-attached printers, while others are able to print only to file. What can be inferred about the affected users’ inability to print?

Options:

A.

They may be attached to the default extensions policy and profile

B.

They may have a host firewall profile set to block activity to all network-attached printers

C.

They may have different disk encryption profiles that are not allowing print jobs on encrypted files

D.

They may be on different device extensions profiles set to block different print jobs

Question 15

A cloud administrator reports high network bandwidth costs attributed to Cortex XDR operations and asks for bandwidth usage to be optimized without compromising agent functionality. Which two techniques should the engineer implement? (Choose two.)

Options:

A.

Configure P2P download sources for agent upgrades and content updates

B.

Enable minor content version updates

C.

Enable agent content management bandwidth control

D.

Deploy a Broker VM and activate the local agent settings applet