Pass the Paloalto Networks PSE-Cortex Professional PSE-Cortex Questions and answers with CertsForce

Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
Questions # 1:

If a customer activates a TMS tenant and has not purchased a Cortex Data Lake instance.

Palo Alto Networks will provide the customer with a free instance

What size is this free Cortex Data Lake instance?

Options:

A.

1 TB


B.

10 GB


C.

100 GB


D.

10 TB


Questions # 2:

Which feature of Cortex XSIAM helps analyst reduce the noise and false positives that often plague traditional SIEM systems?

Options:

A.

Alert range indicators


B.

Al-generated correlation rules


C.

Automatic incident scoring


D.

Dynamic alarm fields


Questions # 3:

What are two ways a customer can configure user authentication access Cortex Xpanse? (Choose two.)

Options:

A.

Secure Shell (SSH)


B.

SAML


C.

RADIUS


D.

Customer Support Portal


Questions # 4:

A customer has purchased Cortex Data Lake storage with the following configuration, which requires 2 TB of Cortex Data Lake to order:

support for 300 total Cortex XDR clients all forwarding Cortex XDR data with 30-day retention

storage for higher fidelity logs to support Cortex XDR advanced analytics

The customer now needs 1000 total Cortex XDR clients, but continues with 300 clients forwarding Cortex XDR data with 30-day retention.

What is the new total storage requirement for Cortex Data Lake storage to order?

Options:

A.

16 TB


B.

4 TB


C.

8 TB


D.

2 TB


Questions # 5:

How does an "inline" auto-extract task affect playbook execution?

Options:

A.

Doesn't wait until the indicators are enriched and continues executing the next step


B.

Doesn't wait until the indicators are enriched but populate context data before executing the next


C.

step. Wait until the indicators are enriched but doesn't populate context data before executing the next step.


D.

Wait until the indicators are enriched and populate context data before executing the next step.


Questions # 6:

An Administrator is alerted to a Suspicious Process Creation security event from multiple users.

The users believe that these events are false positives Which two steps should the administrator take to confirm the false positives and create an exception? (Choose two )

Options:

A.

With the Malware Security profile, disable the "Prevent Malicious Child Process Execution" module


B.

Within the Malware Security profile add the specific parent process, child process, and command line argument to the child process whitelist


C.

In the Cortex XDR security event, review the specific parent process, child process, and command line arguments


D.

Contact support and ask for a security exception.


Questions # 7:

What is a key difference between audit users and full users in Cortex XSOAR?

Options:

A.

Audit users can only view incidents, while full users can edit system components.


B.

Full users can only view dashboards, while audit users can investigate incidents.


C.

Audit users have read-only permission, white full users have read-write permission.


D.

Audit users can run scripts and playbooks, while full users can only view reports.


Questions # 8:

What is a requirement when integrating Cortex XSIAM or Cortex XDR with other Palo Alto Networks products?

Options:

A.

Advanced logging service license


B.

HTTP Collector


C.

Devices in the same region as XDR/XSIAM


D.

XDR/XSIAM Broker VM


Questions # 9:

What is the requirement for enablement of endpoint and network analytics in Cortex XDR?

Options:

A.

Cloud Identity Engine configured and enabled


B.

Network Mapper applet on the Broker VM configured and enabled


C.

Logs from at least 30 endpoints over a minimum of two weeks


D.

Windows DHCP logs ingested via a Cortex XDR collector


Questions # 10:

How can Cortex XSOAR save time when a phishing incident occurs?

Options:

A.

It can automatically email staff to warn them about the phishing attack and show them a copy of the email.


B.

It can automatically respond to the phishing email to unsubscribe from future emails.


C.

It can automatically purge the email from user mailboxes in which it has not yet opened.


D.

It can automatically identify every mailbox that received the phish and create corresponding cases for them.


Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions