New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Paloalto Networks Security Operations XDR-Analyst Questions and answers with CertsForce

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which of the following protection modules is checked first in the Cortex XDR Windows agent malware protection flow?

Options:

A.

Hash Verdict Determination


B.

Behavioral Threat Protection


C.

Restriction Policy


D.

Child Process Protection


Expert Solution
Questions # 22:

What is the purpose of the Cortex Data Lake?

Options:

A.

a local storage facility where your logs and alert data can be aggregated


B.

a cloud-based storage facility where your firewall logs are stored


C.

the interface between firewalls and the Cortex XDR agents


D.

the workspace for your Cortex XDR agents to detonate potential malware files


Expert Solution
Questions # 23:

Which of the following is an example of a successful exploit?

Options:

A.

connecting unknown media to an endpoint that copied malware due to Autorun.


B.

a user executing code which takes advantage of a vulnerability on a local service.


C.

identifying vulnerable services on a server.


D.

executing a process executable for well-known and signed software.


Expert Solution
Questions # 24:

Which type of BIOC rule is currently available in Cortex XDR?

Options:

A.

Threat Actor


B.

Discovery


C.

Network


D.

Dropper


Expert Solution
Questions # 25:

When creating a BIOC rule, which XQL query can be used?

Options:

A.

dataset = xdr_data

| filter event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"


B.

dataset = xdr_data

| filter event_type = PROCESS and

event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"


C.

dataset = xdr_data

| filter action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

| fields action_process_image


D.

dataset = xdr_data

| filter event_behavior = true

event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"


Expert Solution
Questions # 26:

Cortex XDR is deployed in the enterprise and you notice a cobalt strike attack via an ongoing supply chain compromise was prevented on 1 server. What steps can you take to ensure the same protection is extended to all your servers?

Options:

A.

Conduct a thorough Endpoint Malware scan.


B.

Enable DLL Protection on all servers but there might be some false positives.


C.

Enable Behavioral Threat Protection (BTP) with cytool to prevent the attack from spreading.


D.

Create lOCs of the malicious files you have found to prevent their execution.


Expert Solution
Questions # 27:

When creating a scheduled report which is not an option?

Options:

A.

Run weekly on a certain day and time.


B.

Run quarterly on a certain day and time.


C.

Run monthly on a certain day and time.


D.

Run daily at a certain time (selectable hours and minutes).


Expert Solution
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions