New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Paloalto Networks XDR-Analyst Dumps Questions Answers

Page: 1 / 7
Total 91 questions

Palo Alto Networks XDR Analyst Questions and Answers

Question 1

Which two types of exception profiles you can create in Cortex XDR? (Choose two.)

Options:

A.

exception profiles that apply to specific endpoints

B.

agent exception profiles that apply to specific endpoints

C.

global exception profiles that apply to all endpoints

D.

role-based profiles that apply to specific endpoints

Buy Now
Question 2

Which type of BIOC rule is currently available in Cortex XDR?

Options:

A.

Threat Actor

B.

Discovery

C.

Network

D.

Dropper

Question 3

What is the action taken out by Managed Threat Hunting team for Zero Day Exploits?

Options:

A.

MTH researches for threats in the tenant and generates a report with the findings.

B.

MTH researches for threats in the logs and reports to engineering.

C.

MTH runs queries and investigative actions and no further action is taken.

D.

MTH pushes content updates to prevent against the zero-day exploits.

Question 4

Live Terminal uses which type of protocol to communicate with the agent on the endpoint?

Options:

A.

NetBIOS over TCP

B.

WebSocket

C.

UDP and a random port

D.

TCP, over port 80

Question 5

Which statement is true for Application Exploits and Kernel Exploits?

Options:

A.

The ultimate goal of any exploit is to reach the application.

B.

Kernel exploits are easier to prevent then application exploits.

C.

The ultimate goal of any exploit is to reach the kernel.

D.

Application exploits leverage kernel vulnerability.

Question 6

What is the purpose of the Unit 42 team?

Options:

A.

Unit 42 is responsible for automation and orchestration of products

B.

Unit 42 is responsible for the configuration optimization of the Cortex XDR server

C.

Unit 42 is responsible for threat research, malware analysis and threat hunting

D.

Unit 42 is responsible for the rapid deployment of Cortex XDR agents

Question 7

With a Cortex XDR Prevent license, which objects are considered to be sensors?

Options:

A.

Syslog servers

B.

Third-Party security devices

C.

Cortex XDR agents

D.

Palo Alto Networks Next-Generation Firewalls

Question 8

A Linux endpoint with a Cortex XDR Pro per Endpoint license and Enhanced Endpoint Data enabled has reported malicious activity, resulting in the creation of a file that you wish to delete. Which action could you take to delete the file?

Options:

A.

Manually remediate the problem on the endpoint in question.

B.

Open X2go from the Cortex XDR console and delete the file via X2go.

C.

Initiate Remediate Suggestions to automatically delete the file.

D.

Open an NFS connection from the Cortex XDR console and delete the file.

Question 9

A file is identified as malware by the Local Analysis module whereas WildFire verdict is Benign, Assuming WildFire is accurate. Which statement is correct for the incident?

Options:

A.

It is true positive.

B.

It is false positive.

C.

It is a false negative.

D.

It is true negative.

Question 10

When creating a BIOC rule, which XQL query can be used?

Options:

A.

dataset = xdr_data

| filter event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

B.

dataset = xdr_data

| filter event_type = PROCESS and

event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

C.

dataset = xdr_data

| filter action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

| fields action_process_image

D.

dataset = xdr_data

| filter event_behavior = true

event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

Question 11

As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to download Cobalt Strike on one of your servers. Days later, you learn about a massive ongoing supply chain attack. Using Cortex XDR you recognize that your server was compromised by the attack and that Cortex XDR prevented it. What steps can you take to ensure that the same protection is extended to all your servers?

Options:

A.

Create Behavioral Threat Protection (BTP) rules to recognize and prevent the activity.

B.

Enable DLL Protection on all servers but there might be some false positives.

C.

Create IOCs of the malicious files you have found to prevent their execution.

D.

Enable Behavioral Threat Protection (BTP) with cytool to prevent the attack from spreading.

Question 12

Cortex XDR Analytics can alert when detecting activity matching the following MITRE ATT&CKTM techniques.

Options:

A.

Exfiltration, Command and Control, Collection

B.

Exfiltration, Command and Control, Privilege Escalation

C.

Exfiltration, Command and Control, Impact

D.

Exfiltration, Command and Control, Lateral Movement

Question 13

What kind of the threat typically encrypts user files?

Options:

A.

ransomware

B.

SQL injection attacks

C.

Zero-day exploits

D.

supply-chain attacks

Question 14

Which Exploit Protection Module (EPM) can be used to prevent attacks based on OS function?

Options:

A.

UASLR

B.

JIT Mitigation

C.

Memory Limit Heap Spray Check

D.

DLL Security

Question 15

What is an example of an attack vector for ransomware?

Options:

A.

Performing DNS queries for suspicious domains

B.

Performing SSL Decryption on an endpoint

C.

Phishing emails containing malicious attachments

D.

A URL filtering feature enabled on a firewall

Question 16

Where would you go to add an exception to exclude a specific file hash from examination by the Malware profile for a Windows endpoint?

Options:

A.

Find the Malware profile attached to the endpoint, Under Portable Executable and DLL Examination add the hash to the allow list.

B.

From the rules menu select new exception, fill out the criteria, choose the scope to apply it to, hit save.

C.

Find the exceptions profile attached to the endpoint, under process exceptions select local analysis, paste the hash and save.

D.

In the Action Center, choose Allow list, select new action, select add to allow list, add your hash to the list, and apply it.

Question 17

In the deployment of which Broker VM applet are you required to install a strong cipher SHA256-based SSL certificate?

Options:

A.

Agent Proxy

B.

Agent Installer and Content Caching

C.

Syslog Collector

D.

CSV Collector

Question 18

How does Cortex XDR agent for Windows prevent ransomware attacks from compromising the file system?

Options:

A.

by encrypting the disk first.

B.

by utilizing decoy Files.

C.

by retrieving the encryption key.

D.

by patching vulnerable applications.

Question 19

When is the wss (WebSocket Secure) protocol used?

Options:

A.

when the Cortex XDR agent downloads new security content

B.

when the Cortex XDR agent uploads alert data

C.

when the Cortex XDR agent connects to WildFire to upload files for analysis

D.

when the Cortex XDR agent establishes a bidirectional communication channel

Question 20

Which type of IOC can you define in Cortex XDR?

Options:

A.

Destination IP Address

B.

Source IP Address

C.

Source port

D.

Destination IP Address: Destination

Question 21

Why would one threaten to encrypt a hypervisor or, potentially, a multiple number of virtual machines running on a server?

Options:

A.

To extort a payment from a victim or potentially embarrass the owners.

B.

To gain notoriety and potentially a consulting position.

C.

To better understand the underlying virtual infrastructure.

D.

To potentially perform a Distributed Denial of Attack.

Question 22

Which of the following policy exceptions applies to the following description?

‘An exception allowing specific PHP files’

Options:

A.

Support exception

B.

Local file threat examination exception

C.

Behavioral threat protection rule exception

D.

Process exception

Question 23

When investigating security events, which feature in Cortex XDR is useful for reverting the changes on the endpoint?

Options:

A.

Remediation Automation

B.

Machine Remediation

C.

Automatic Remediation

D.

Remediation Suggestions

Question 24

As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to open a malicious Word document. You learn from the WildFire report and AutoFocus that this document is known to have been used in Phishing campaigns since 2018. What steps can you take to ensure that the same document is not opened by other users in your organization protected by the Cortex XDR agent?

Options:

A.

Enable DLL Protection on all endpoints but there might be some false positives.

B.

Create Behavioral Threat Protection (BTP) rules to recognize and prevent the activity.

C.

No step is required because Cortex shares IOCs with our fellow Cyber Threat Alliance members.

D.

No step is required because the malicious document is already stopped.

Question 25

What are two purposes of “Respond to Malicious Causality Chains” in a Cortex XDR Windows Malware profile? (Choose two.)

Options:

A.

Automatically close the connections involved in malicious traffic.

B.

Automatically kill the processes involved in malicious activity.

C.

Automatically terminate the threads involved in malicious activity.

D.

Automatically block the IP addresses involved in malicious traffic.

Question 26

You can star security events in which two ways? (Choose two.)

Options:

A.

Create an alert-starring configuration.

B.

Create an Incident-starring configuration.

C.

Manually star an alert.

D.

Manually star an Incident.

Question 27

Which license is required when deploying Cortex XDR agent on Kubernetes Clusters as a DaemonSet?

Options:

A.

Cortex XDR Pro per TB

B.

Host Insights

C.

Cortex XDR Pro per Endpoint

D.

Cortex XDR Cloud per Host

Page: 1 / 7
Total 91 questions