Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Paloalto Networks XSIAM-Analyst Palo Alto Networks XSIAM Analyst Exam Practice Test

Palo Alto Networks XSIAM Analyst Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$43.75  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$38.5  $109.99
Question 1

Which query will hunt for only incoming traffic from 99.99.99.99 when all log sources have been mapped to XDM?

Options:

A.

datamodel preset = * | filter XDM.ALIAS.ip = "99.99.99.99"

B.

datamodel dataset = * filter XDM.ALIAS.ipv4 = "99.99.99.99"

C.

datamodel dataset = * | fields fieldset.xdm_network | filter xdm.source.ipv4 = "99.99.99.99"

D.

preset = network_story | filter agent_ip_addresses = "99.99.99.99"

Question 2

Which Cytool command will re-enable protection on an endpoint that has Cortex XDR agent protection paused?

Options:

A.

cytool security enable

B.

cytool runtime start

C.

cytool service start

D.

cytool protect enable

Question 3

How can a SOC analyst highlight alerts generated on C-level executive hosts?

Options:

A.

Add the C-level executive users to the Executive Accounts asset role.

B.

Add a tag to the C-level executive users

C.

Create a Featured Alert field for the C-level hosts

D.

Create a dynamic group for the C-level hosts.

Question 4

A security analyst is reviewing alerts and incidents associated with internal vulnerability scanning performed by the security operations team.

Which built-in incident domain will be assigned to these alerts and incidents in Cortex XSIAM?

Options:

A.

Security

B.

Health

C.

Hunting

D.

IT

Question 5

Which configuration will ensure any alert involving a specific critical asset will always receive a score of 100?

Options:

A.

An asset as critical in Asset Inventory

B.

SmartScore to apply the specific score to the critical asset

C.

A user scoring rule for the critical asset

D.

A risk scoring policy for the critical asset

Question 6

Which dataset should an analyst search when looking for Palo Alto Networks NGFW logs?

Options:

A.

dataset = pan_dss_raw

B.

dataset = ngfw

C.

dataset = panwngfwtraffic_raw

D.

dataset = ngfw_threat_panw_raw

Question 7

SCENARIO:

A security analyst has been assigned a ticket from the help desk stating that users are experiencing errors when attempting to open files on a specific network share. These errors state that the file format cannot be opened. IT has verified that the file server is online and functioning, but that all files have unusual extensions attached to them.

The security analyst reviews alerts within Cortex XSIAM and identifies malicious activity related to a possible ransomware attack on the file server. This incident is then escalated to the incident response team for further investigation.

Upon reviewing the incident, the responders confirm that ransomware was successfully executed on the file server. Other details of the attack are noted below:

• An unpatched vulnerability on an externally facing web server was exploited for initial access

• The attackers successfully used Mimikatz to dump sensitive credentials that were used for privilege escalation

• PowerShell was used on a Windows server for additional discovery, as well as lateral movement to other systems

• The attackers executed SystemBC RAT on multiple systems to maintain remote access

• Ransomware payload was downloaded on the file server via an external site "file io"

QUESTION STATEMENT:

Which hunt collection category in Cortex XSIAM should the incident responders use to identify all systems where the attackers established persistence during the attack?

Options:

A.

Remote Access

B.

Network Data

C.

Process Execution

D.

Command History

Question 8

Which statement applies to a low-severity alert when a playbook trigger has been configured?

Options:

A.

The alert playbook will automatically run when grouped in an incident.

B.

The alert playbook will run if the severity increases to medium or higher.

C.

The alert playbook can be manually run by an analyst.

D.

Only low-severity analytics alerts will automatically run playbooks.

Question 9

During an investigation of an alert with a completed playbook, it is determined that no indicators exist from the email "indicator@test.com" in the Key Assets & Artifacts tab of the parent incident. Which command will determine if Cortex XSIAM has been configured to extract indicators as expected?

Options:

A.

IcreateNewIndicator value="indicator@test.com"

B.

!extractIndicators text="indicator@test.com" auto-extract=inline

C.

!checkIndicatorExtraction text="indicator@test.com"

D.

Iemailvalue="indicator@test.com"

Question 10

While investigating an alert, an analyst notices that a URL indicator has a related alert from a previous incident. The related alert has the same URL but it resolved to a different IP address.

Which combination of two actions should the analyst take to resolve this issue? (Choose two.)

Options:

A.

Expire the URL indicator

B.

Remove the relationship between the URL and the older IP address

C.

Enrich the IP address indicator associated with the previous alert

D.

Enrich the URL indicator

Question 11

How would Incident Context be referenced in an alert War Room task or alert playbook task?

Options:

A.

${parentIncidentContext}

B.

${getparentIncidentFields}

C.

${parentIncidentFields}

D.

${getParentIncidentContext}

Question 12

Which two actions can an analyst take to reduce the number of false positive alerts generated by a custom BIOC? (Choose two.)

Options:

A.

Implement a global exception in the prevention profile.

B.

Implement a shunt in a BIOC bypass rule

C.

Implement an alert exclusion rule.

D.

Implement a BIOC rule exception

Question 13

Which two statements apply to IOC rules? (Choose two)

Options:

A.

They can be used to detect a specific registry key.

B.

They can have an expiration date of up to 180 days.

C.

They can be excluded using suppression rules but not alert exclusions.

D.

They can be uploaded using REST API.

Question 14

What is the expected behavior when querying a data model with no specific fields specified in the query?

Options:

A.

The query will error out and not run.

B.

The default dataset=xdr_data fields will be returned.

C.

No fields will be returned by default.

D.

The xdm_core fieldset will be returned by default.

Question 15

Which pane in the User Risk View will identify the country from which a user regularly logs in, based on the past few weeks of data?

Options:

A.

Login Attempts

B.

Common Locations

C.

Actual Activity

D.

Latest Authentication Attempts