Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Paloalto Networks Security Operations SecOps-Pro Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

A new incident in Cortex XSIAM contains WildFire malware and Behavioral Threat Protection (BTP) alerts about an unsigned process attempting to dump the memory of lsass.exe . Which initial verdict applies to this incident?

Options:

A.

False positive


B.

True positive


C.

False negative


D.

True negative


Expert Solution
Questions # 12:

Which scripting language will allow the use of the Query Builder in Cortex XDR to show the top five accounts with failed Windows logons in the past 24 hours? (Choose one answer)

Options:

A.

PowerShell


B.

JavaScript


C.

XQL


D.

Python


Expert Solution
Questions # 13:

According to the Traffic Light Protocol (TLP) 2.0 standard, which classification is used for information that is restricted to the specific individuals involved in an investigation and cannot be shared further?

Options:

A.

TLP:CLEAR


B.

TLP:GREEN


C.

TLP:AMBER


D.

TLP:RED


Expert Solution
Questions # 14:

Which Cortex XSOAR feature is used to ensure that specific data points from an incoming alert (such as a "Source_Address" from a firewall log) are correctly assigned to the standardized "Source IP" field within the XSOAR incident?

Options:

A.

Classification


B.

Mapping


C.

Data Normalization


D.

Playbook Transformation


Expert Solution
Questions # 15:

Which response action in Cortex XDR allows a SOC analyst to remotely access an endpoint’s command-line interface to perform manual forensic data collection or system remediation?

Options:

A.

Remote Shell


B.

Live Terminal


C.

Action Center


D.

Python Console


Expert Solution
Questions # 16:

What is the primary benefit of "Platformization"—the consolidation of disparate security tools into a unified platform like Cortex—for a modern SOC?

Options:

A.

Increasing the total number of alerts to ensure maximum visibility.


B.

Reducing the complexity of the security stack and improving data correlation.


C.

Completely eliminating the need for human analysts in the SOC.


D.

Allowing every business department to manage its own security tools independently.


Expert Solution
Questions # 17:

Which two statements are relevant to reports in Cortex XDR? (Choose two.)

Options:

A.

They can be sent in a password protected PDF version.


B.

They can be automatically pushed to the corporate intranet.


C.

They can use mock data for visualization.


D.

They can have an attached screenshot of an XQL query widget.


Expert Solution
Questions # 18:

Which statement explains the difference between the Cortex Identity Threat Detection and Response (ITDR) module and Identity Analytics in Cortex XSIAM?

Options:

A.

Identity Analytics detects suspicious logins and MFA spamming, whereas the ITDR module defends against anomalous insider activity and exfiltration to physical devices.


B.

The ITDR module is designed for compliance reporting, while Identity Analytics focuses on detecting and responding to brute force attacks and excessive logins.


C.

Identity Analytics provides prevention of suspicious logins, whereas the ITDR module focuses on advanced threat vectors.


D.

The ITDR module provides basic security event monitoring, while Identity Analytics focuses on integrating various security tools.


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions