Pass the Paloalto Networks Security Operations XDR-Engineer Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

Based on the Malware profile image below, what happens when a new custom-developed application attempts to execute on an endpoint?

Question # 11

Options:

A.

It will immediately execute


B.

It will not execute


C.

It will execute after one hour


D.

It will execute after the second attempt


Questions # 12:

Multiple remote desktop users complain of in-house applications no longer working. The team uses macOS with Cortex XDR agents version 8.7.0, and the applications were previously allowed by disable prevention rules attached to the Exceptions Profile "Engineer-Mac." Based on the images below, what is a reason for this behavior?

Question # 12

Options:

A.

Endpoint IP address changed from 192.168.0.0 range to 192.168.100.0 range


B.

The Cloud Identity Engine is disconnected or removed


C.

XDR agent version was downgraded from 8.7.0 to 8.4.0


D.

Installation type changed from VDI to Kubernetes


Questions # 13:

An XDR engineer is configuring an automation playbook to respond to high-severity malware alerts by automatically isolating the affected endpoint and notifying the security team via email. The playbook should only trigger for alerts generated by the Cortex XDR analytics engine, not custom BIOCs. Which two conditions should the engineer include in the playbook trigger to meet these requirements? (Choose two.)

Options:

A.

Alert severity is High


B.

Alert source is Cortex XDR Analytics


C.

Alert category is Malware


D.

Alert status is New


Questions # 14:

During deployment of Cortex XDR for Linux Agents, the security engineering team is asked to implement memory monitoring for agent health monitoring. Which agent service should be monitored to fulfill this request?

Options:

A.

dypdng


B.

clad


C.

pyxd


D.

pmd


Questions # 15:

What is a benefit of ingesting and forwarding Palo Alto Networks NGFW logs to Cortex XDR?

Options:

A.

Sending endpoint logs to the NGFW for analysis


B.

Blocking network traffic based on Cortex XDR detections


C.

Enabling additional analysis through enhanced application logging


D.

Automated downloading of malware signatures from the NGFW


Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions