Pass the Paloalto Networks Palo Alto Certifications and Accreditations PCDRA Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Cortex XDR Analytics can alert when detecting activity matching the following MITRE ATT&CKTM techniques.

Options:

A.

Exfiltration, Command and Control, Collection


B.

Exfiltration, Command and Control, Privilege Escalation


C.

Exfiltration, Command and Control, Impact


D.

Exfiltration, Command and Control, Lateral Movement


Expert Solution
Questions # 12:

Which of the following is an example of a successful exploit?

Options:

A.

connecting unknown media to an endpoint that copied malware due to Autorun.


B.

a user executing code which takes advantage of a vulnerability on a local service.


C.

identifying vulnerable services on a server.


D.

executing a process executable for well-known and signed software.


Expert Solution
Questions # 13:

Which statement is true based on the following Agent Auto Upgrade widget?

Question # 13

Options:

A.

There are a total of 689 Up To Date agents.


B.

Agent Auto Upgrade was enabled but not on all endpoints.


C.

Agent Auto Upgrade has not been enabled.


D.

There are more agents in Pending status than In Progress status.


Expert Solution
Questions # 14:

To stop a network-based attack, any interference with a portion of the attack pattern is enough to prevent it from succeeding. Which statement is correct regarding the Cortex XDR Analytics module?

Options:

A.

It does not interfere with any portion of the pattern on the endpoint.


B.

It interferes with the pattern as soon as it is observed by the firewall.


C.

It does not need to interfere with the any portion of the pattern to prevent the attack.


D.

It interferes with the pattern as soon as it is observed on the endpoint.


Expert Solution
Questions # 15:

Where would you view the WildFire report in an incident?

Options:

A.

next to relevant Key Artifacts in the incidents details page


B.

under Response --> Action Center


C.

under the gear icon --> Agent Audit Logs


D.

on the HUB page at apps.paloaltonetworks.com


Expert Solution
Questions # 16:

What types of actions you can execute with live terminal session?

Options:

A.

Manage Network configurations, Quarantine Files, Run PowerShell scripts


B.

Manage Processes, Manage Files, Run Operating System Commands, Run Ruby Commands and Scripts


C.

Apply patches, Reboot System, send notification for end user, Run Python Commands and Scripts


D.

Manage Processes, Manage Files, Run Operating System Commands, Run Python Commands and Scripts


Expert Solution
Questions # 17:

Which of the following policy exceptions applies to the following description?

‘An exception allowing specific PHP files’

Options:

A.

Support exception


B.

Local file threat examination exception


C.

Behavioral threat protection rule exception


D.

Process exception


Expert Solution
Questions # 18:

Which of the following Live Terminal options are available for Android systems?

Options:

A.

Live Terminal is not supported.


B.

Stop an app.


C.

Run APK scripts.


D.

Run Android commands.


Expert Solution
Questions # 19:

Which of the following represents a common sequence of cyber-attack tactics?

Options:

A.

Actions on the objective » Reconnaissance »Weaponization& Delivery » Exploitation » Installation » Command & Control


B.

Installation >> Reconnaissance »Weaponization& Delivery » Exploitation » Command & Control » Actions on the objective


C.

Reconnaissance »Weaponization& Delivery » Exploitation » Installation » Command & Control » Actions on the objective


D.

Reconnaissance >> Installation »Weaponization& Delivery » Exploitation » Command & Control » Actions on the objective


Expert Solution
Questions # 20:

What is the purpose of targeting software vendors in a supply-chain attack?

Options:

A.

to take advantage of a trusted software delivery method.


B.

to steal users’ login credentials.


C.

to access source code.


D.

to report Zero-day vulnerabilities.


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions