Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Paloalto Networks XSIAM-Engineer Palo Alto Networks XSIAM Engineer Exam Practice Test

Palo Alto Networks XSIAM Engineer Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$43.75  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$38.5  $109.99
Question 1

What is a key characteristic of a parsing rule in Cortex XSIAM?

Options:

A.

It uses regular expressions exclusively for data modifications, discards unmatched logs by default, and only retains fields with non-null values.

B.

It is bound to all vendors and products, performs data parsing once per log, and does not allow grouping.

C.

It is bound to a specific vendor and product, performs data parsing once per log, and does not allow grouping.

D.

It is bound to a specific vendor and product which allow grouping with a no-match policy, and retains all fields.

Question 2

Which action is required to enable use of a custom script in an alert layout?

Options:

A.

Tag the script with "dynamic-section," add a general purpose dynamic section, and edit the section settings to add the automation script.

B.

Tag the script with "general-purpose-dynamic-section," add a custom script section, and edit the section settings to add the automation script.

C.

Add a general purpose dynamic section and edit the section settings to add the automation script.

D.

Tag the script with "general-purpose-dynamic-section." add a general purpose dynamic section, and edit the section settings to add the automation script.

Question 3

While using the remote repository on a Development XSIAM tenant, which two objects can be pushed or pulled to the remote repository? (Choose two.)

Options:

A.

Scripts

B.

Parsing rules

C.

iLists

D.

Layouts

Question 4

Cortex XSIAM has not received any logs for 30 minutes from a Palo Alto Networks NGFW named "MainFW.” An engineer wants to create an alert for this scenario.

Correlation rule settings include:

Time Schedule: Every 30 minutes

Query Timeframe: 30 minutes

Action: Generate alert

Alert Name: No logs received from MainFW in the past 30 minutes

Which query should be used in the correlation rule?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 5

A CISO has asked an engineer to create a custom dashboard in Cortex XSIAM that can be filtered to show incidents assigned to a specific user.

Which feature should be used to filter the incident data in the dashboard?

Options:

A.

Filters and inputs in the custom dashboard

B.

Report template to set the incident user filter

C.

Visualization filter options in the widget configuration

D.

Incident summary view to filter by user

Question 6

Which installer type should be used when upgrading a non-Linux Kubernetes cluster?

Options:

A.

Standalone

B.

Helm

C.

Upgrade from ESM

D.

Kubernetes

Question 7

In the Incident War Room, which command is used to update incident fields identified in the incident layout?

Options:

A.

!setIncidentFields

B.

!setParentIncidentFields

C.

!setParentIncidentContext

D.

!updateParentIncidentFields

Question 8

A Cortex XSIAM engineer adds a disable injection and prevention rule for a specific running process. After an hour, the engineer disables the rule to reinstate the security capabilities, but the capabilities are not applied.

What is the explanation for this behavior?

Options:

A.

The engineer needs to restart the process to get back the security capabilities.

B.

The engineer needs a support exception to get back the security capabilities.

C.

The engineer needs to wait for the time period configured in the rule to pass first.

D.

The engineer can disable the rule, but security capabilities are not applied to the process.

Question 9

What is the purpose of using rolling tokens to manage Cortex XDR agents?

Options:

A.

To periodically rotate encryption keys used for tenant communication

B.

To perform administration on agents without requiring static credentials

C.

To authorize agents to download and install content updates

D To temporarily disable the agents during maintenance windows

Question 10

What is the function of the "MODEL" section when creating a data model rule?

Options:

A.

To make a list of all the relevant fields to be mapped from the logs to XDM

B.

To define the mapping between a single dataset and XDM

C.

To finalize rule definition with all XQL statements

D.

To map log fields to corresponding Cortex XSIAM Data Model (XDM) fields

Question 11

Which cytool command will look up the policy being applied to a Cortex XDR agent?

Options:

A.

cytool adaptive_policy interval 0

B.

cytool payload_execution query

C.

cytool adaptive_policy recalc

D.

cytool persist print agent_settings.db

Question 12

How does Cortex XSIAM manage licensing for Kubernetes environments?

Options:

A.

Managed per namespace and returned when the namespace is decommissioned

B.

Issued per container and returned upon container termination

C.

Issued for each node and returned when the agent is removed or the node is deleted

D.

Applied per service deployment and returned upon service deactivation

Question 13

A vulnerability analyst asks a Cortex XSIAM engineer to identify assets vulnerable to newly reported zero-day CVE affecting the "ai_app" application and versions 12.1, 12.2, 12.4, and 12.5.

Which XQL query will provide the required result?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 14

Which common issue can result in sudden data ingestion loss for a data source that was previously successful?

Options:

A.

Data source is using an unsupported data format.

B.

Data source has reached its maximum storage capacity.

C.

Data source has reached its end of life for support.

D.

API key used for the integration has expired.

Question 15

A Behavioral Threat Protection (BTP) alert is triggered with an action of "Prevented (Blocked)" on one of several application servers running Windows Server 2022. The investigation determines the involved processes to be legitimate core OS binaries, and the description from the triggered BTP rule is an acceptable risk for the company to allow the same activity in the future.

This type of activity is only expected on the endpoints that are members of the endpoint group "AppServers," which already has a separate prevention policy rule with an exceptions profile named "Exceptions-AppServers" and a malware profile named "Malware-AppServers."

The CGO that was terminated has the following properties:

SHA256: eb71ea69dd19f728ab9240565e8c7efb59821e19e3788e289301e1e74940c208

File path: C:\Windows\System32\cmd.exe

Digital Signer: Microsoft Corporation

How should the exception be created so that it is scoped as narrowly as possible to minimize the security gap?

Options:

A.

Create the exception via the alert itself, selecting the CGO hash, CGO signer, CGO process path, and applying the scope to the "Exceptions-AppServers" profile.

B.

Create a Disable Prevention Rule via Exceptions Configuration with the following selections:

C.

Create a Legacy Agent Exception via Exceptions Configuration with the following selections:

D.

Create the exception via the alert itself, selecting the CGO hash, CGO signer, CGO process path, and applying the scope to "Global."

Question 16

The following string is a value of a key named "Data2" in the context:

{"@admin":"admin","@dirtyld":"1","@loc":"Lab","@name":"default‑1","@oldname":"Test","@time":"2024/08/28 07:45:15","alert":{"@admin":"admin","@dirtyld":"2","@time":"2024/08/28 07:45:15","member":{"#text":"

Based on the image below, what will be displayed in the "Test result" field when the "Test" button is pressed?

Options:

A.

1

B.

"1

C.

2

D.

"2

Question 17

How will Cortex XSIAM help with raw log ingestion from third-party sources in an existing infrastructure?

Options:

A.

Any structured logs coming into it are left completely unchanged, and only metadata is added to the raw data.

B.

For structured logs, like CEF, LEEF, and JSON, it decouples the key-value pairs and saves them in table format.

C.

Any unstructured logs coming into it are left completely unchanged, and metadata is not added to the raw data.

D.

For unstructured logs, it decouples the key-value pairs and saves them in a table format.