Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Security Operations XDR-Engineer Full Course Free

Palo Alto Networks XDR Engineer Questions and Answers

Question 9

The most recent Cortex XDR agents are being installed at a newly acquired company. A list with endpoint types (i.e., OS, hardware, software) is provided to the engineer. What should be cross-referenced for the Linux systems listed regarding the OS types and OS versions supported?

Options:

A.

Content Compatibility Matrix

B.

Kernel Module Version Support

C.

End-of-Life Summary

D.

Agent Installer Certificate

Question 10

An XDR engineer is creating a correlation rule to monitor login activity on specific systems. When the activity is identified, an alert is created. The alerts are being generated properly but are missing the username when viewed. How can the username information be included in the alerts?

Options:

A.

Select “Initial Access” in the MITRE ATT&CK mapping to include the username

B.

Update the query in the correlation rule to include the username field

C.

Add a mapping for the username field in the alert fields mapping

D.

Add a drill-down query to the alert which pulls the username field

Question 11

An engineer wants to automate the handling of alerts in Cortex XDR and defines several automation rules with different actions to be triggered based on specific alert conditions. Some alerts do not trigger the automation rules as expected. Which statement explains why the automation rules might not apply to certain alerts?

Options:

A.

They are executed in sequential order, so alerts may not trigger the correct actions if the rules are not configured properly

B.

They only apply to new alerts grouped into incidents by the system and only alerts that generateincidents trigger automation actions

C.

They can only be triggered by alerts with high severity; alerts with low or informational severity will not trigger the automation rules

D.

They can be applied to any alert, but they only work if the alert is manually grouped into an incident by the analyst

Question 12

An XDR engineer is configuring an automation playbook to respond to high-severity malware alerts by automatically isolating the affected endpoint and notifying the security team via email. The playbook should only trigger for alerts generated by the Cortex XDR analytics engine, not custom BIOCs. Which two conditions should the engineer include in the playbook trigger to meet these requirements? (Choose two.)

Options:

A.

Alert severity is High

B.

Alert source is Cortex XDR Analytics

C.

Alert category is Malware

D.

Alert status is New