New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Paloalto Networks Security Operations XDR-Analyst Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

When is the wss (WebSocket Secure) protocol used?

Options:

A.

when the Cortex XDR agent downloads new security content


B.

when the Cortex XDR agent uploads alert data


C.

when the Cortex XDR agent connects to WildFire to upload files for analysis


D.

when the Cortex XDR agent establishes a bidirectional communication channel


Expert Solution
Questions # 2:

Which of the following policy exceptions applies to the following description?

‘An exception allowing specific PHP files’

Options:

A.

Support exception


B.

Local file threat examination exception


C.

Behavioral threat protection rule exception


D.

Process exception


Expert Solution
Questions # 3:

Which of the following best defines the Windows Registry as used by the Cortex XDR agent?

Options:

A.

a hierarchical database that stores settings for the operating system and for applications


B.

a system of files used by the operating system to commit memory that exceeds the available hardware resources. Also known as the “swap”


C.

a central system, available via the internet, for registering officially licensed versions of software to prove ownership


D.

a ledger for maintaining accurate and up-to-date information on total disk usage and disk space remaining available to the operating system


Expert Solution
Questions # 4:

What types of actions you can execute with live terminal session?

Options:

A.

Manage Network configurations, Quarantine Files, Run PowerShell scripts


B.

Manage Processes, Manage Files, Run Operating System Commands, Run Ruby Commands and Scripts


C.

Apply patches, Reboot System, send notification for end user, Run Python Commands and Scripts


D.

Manage Processes, Manage Files, Run Operating System Commands, Run Python Commands and Scripts


Expert Solution
Questions # 5:

In incident-related widgets, how would you filter the display to only show incidents that were “starred”?

Options:

A.

Create a custom XQL widget


B.

This is not currently supported


C.

Create a custom report and filter on starred incidents


D.

Click the star in the widget


Expert Solution
Questions # 6:

If you have an isolated network that is prevented from connecting to the Cortex Data Lake, which type of Broker VM setup can you use to facilitate the communication?

Options:

A.

Broker VM Pathfinder


B.

Local Agent Proxy


C.

Local Agent Installer and Content Caching


D.

Broker VM Syslog Collector


Expert Solution
Questions # 7:

What kind of malware uses encryption, data theft, denial of service, and possibly harassment to take advantage of a victim?

Options:

A.

Ransomware


B.

Worm


C.

Keylogger


D.

Rootkit


Expert Solution
Questions # 8:

Which minimum Cortex XDR agent version is required for Kubernetes Cluster?

Options:

A.

Cortex XDR 6.1


B.

Cortex XDR 7.4


C.

Cortex XDR 7.5


D.

Cortex XDR 5.0


Expert Solution
Questions # 9:

Which module provides the best visibility to view vulnerabilities?

Options:

A.

Live Terminal module


B.

Device Control Violations module


C.

Host Insights module


D.

Forensics module


Expert Solution
Questions # 10:

What kind of the threat typically encrypts user files?

Options:

A.

ransomware


B.

SQL injection attacks


C.

Zero-day exploits


D.

supply-chain attacks


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions