Pass the Paloalto Networks Security Operations XDR-Engineer Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

A static endpoint group is created by adding 321 endpoints using the Upload From File feature. However, after group creation, the members count field shows 244 endpoints. What are two possible reasons why endpoints were not added to the group? (Choose two.)

Options:

A.

Static groups have a limit of 250 endpoints when adding by file


B.

Endpoints added to the new group were previously added to an existing group


C.

Endpoints added to the group were in Disconnected or Connection Lost status when groupmembership was added


D.

The IP address, hostname, or alias of the endpoints must match an existing agent that has registered with the tenant


Questions # 2:

How are dynamic endpoint groups created and managed in Cortex XDR?

Options:

A.

Endpoint groups require intervention to update the group with new endpoints when a new device is added to the network


B.

Each endpoint can belong to multiple groups simultaneously, allowing different security policies to be applied to the same device at the same time


C.

After an endpoint group is created, its assigned security policy cannot be changed without deleting and recreating the group


D.

Endpoint groups are defined based on fields such as OS type, OS version, and network segment


Questions # 3:

Which step is required to configure a proxy for an XDR Collector?

Options:

A.

Edit the YAML configuration file with the new proxy information


B.

Restart the XDR Collector after configuring the proxy settings


C.

Connect the XDR Collector to the Pathfinder


D.

Configure the proxy settings on the Cortex XDR tenant


Questions # 4:

Which components may be included in a Cortex XDR content update?

Options:

A.

Device control profiles, agent versions, and kernel support


B.

Behavioral Threat Protection (BTP) rules and local analysis logic


C.

Antivirus definitions and agent versions


D.

Firewall rules and antivirus definitions


Questions # 5:

In addition to using valid authentication credentials, what is required to enable the setup of the Database Collector applet on the Broker VM to ingest database activity?

Options:

A.

Valid SQL query targeting the desired data


B.

Access to the database audit log


C.

Database schema exported in the correct format


D.

Access to the database transaction log


Questions # 6:

A multinational company with over 300,000 employees has recently deployed Cortex XDR in North America. The solution includes the Identity Threat Detection and Response (ITDR) add-on, and the Cortex team has onboarded the Cloud Identity Engine to the North American tenant. After waiting the required soak period and deploying enough agents to receive Identity and threat analytics detections, the team does not see user, group, or computer details for individuals from the European offices. What may be the reason for the issue?

Options:

A.

The XDR tenant is not in the same region as the Cloud Identity Engine


B.

The Cloud Identity Engine plug-in has not been installed and configured


C.

The Cloud Identity Engine needs to be activated in all global regions


D.

The ITDR add-on is not compatible with the Cloud Identity Engine


Questions # 7:

Log events from a previously deployed Windows XDR Collector agent are no longer being observed in the console after an OS upgrade. Which aspect of the log events is the probable cause of this behavior?

Options:

A.

They are greater than 5MB


B.

They are in Winlogbeat format


C.

They are in Filebeat format


D.

They are less than 1MB


Questions # 8:

How long is data kept in the temporary hot storage cache after being queried from cold storage?

Options:

A.

1 hour, re-queried to a maximum of 12 hours


B.

24 hours, re-queried to a maximum of 7 days


C.

24 hours, re-queried to a maximum of 14 days


D.

1 hour, re-queried to a maximum of 24 hours


Questions # 9:

An engineer wants to automate the handling of alerts in Cortex XDR and defines several automation rules with different actions to be triggered based on specific alert conditions. Some alerts do not trigger the automation rules as expected. Which statement explains why the automation rules might not apply to certain alerts?

Options:

A.

They are executed in sequential order, so alerts may not trigger the correct actions if the rules are not configured properly


B.

They only apply to new alerts grouped into incidents by the system and only alerts that generateincidents trigger automation actions


C.

They can only be triggered by alerts with high severity; alerts with low or informational severity will not trigger the automation rules


D.

They can be applied to any alert, but they only work if the alert is manually grouped into an incident by the analyst


Questions # 10:

An XDR engineer is creating a correlation rule to monitor login activity on specific systems. When the activity is identified, an alert is created. The alerts are being generated properly but are missing the username when viewed. How can the username information be included in the alerts?

Options:

A.

Select “Initial Access” in the MITRE ATT&CK mapping to include the username


B.

Update the query in the correlation rule to include the username field


C.

Add a mapping for the username field in the alert fields mapping


D.

Add a drill-down query to the alert which pulls the username field


Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions