New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Pearson XDR-Analyst New Attempt

Page: 4 / 7
Total 91 questions

Palo Alto Networks XDR Analyst Questions and Answers

Question 13

What kind of the threat typically encrypts user files?

Options:

A.

ransomware

B.

SQL injection attacks

C.

Zero-day exploits

D.

supply-chain attacks

Question 14

Which Exploit Protection Module (EPM) can be used to prevent attacks based on OS function?

Options:

A.

UASLR

B.

JIT Mitigation

C.

Memory Limit Heap Spray Check

D.

DLL Security

Question 15

What is an example of an attack vector for ransomware?

Options:

A.

Performing DNS queries for suspicious domains

B.

Performing SSL Decryption on an endpoint

C.

Phishing emails containing malicious attachments

D.

A URL filtering feature enabled on a firewall

Question 16

Where would you go to add an exception to exclude a specific file hash from examination by the Malware profile for a Windows endpoint?

Options:

A.

Find the Malware profile attached to the endpoint, Under Portable Executable and DLL Examination add the hash to the allow list.

B.

From the rules menu select new exception, fill out the criteria, choose the scope to apply it to, hit save.

C.

Find the exceptions profile attached to the endpoint, under process exceptions select local analysis, paste the hash and save.

D.

In the Action Center, choose Allow list, select new action, select add to allow list, add your hash to the list, and apply it.

Page: 4 / 7
Total 91 questions