New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Paloalto Networks Security Operations XSIAM-Analyst Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

SCENARIO:

A security analyst has been assigned a ticket from the help desk stating that users are experiencing errors when attempting to open files on a specific network share. These errors state that the file format cannot be opened. IT has verified that the file server is online and functioning, but that all files have unusual extensions attached to them.

The security analyst reviews alerts within Cortex XSIAM and identifies malicious activity related to a possible ransomware attack on the file server. This incident is then escalated to the incident response team for further investigation.

Upon reviewing the incident, the responders confirm that ransomware was successfully executed on the file server. Other details of the attack are noted below:

• An unpatched vulnerability on an externally facing web server was exploited for initial access

• The attackers successfully used Mimikatz to dump sensitive credentials that were used for privilege escalation

• PowerShell was used on a Windows server for additional discovery, as well as lateral movement to other systems

• The attackers executed SystemBC RAT on multiple systems to maintain remote access

• Ransomware payload was downloaded on the file server via an external site "file io"

QUESTION STATEMENT:

Which forensics artifact collected by Cortex XSIAM will help the responders identify what the attackers were looking for during the discovery phase of the attack?

Options:

A.

PSReadline


B.

WordWheelQuery


C.

User access logging


D.

Shell history


Expert Solution
Questions # 2:

A security analyst is reviewing alerts and incidents associated with internal vulnerability scanning performed by the security operations team.

Which built-in incident domain will be assigned to these alerts and incidents in Cortex XSIAM?

Options:

A.

Security


B.

Health


C.

Hunting


D.

IT


Expert Solution
Questions # 3:

An incident in Cortex XSIAM contains the following series of alerts:

    10:24:17 AM - Informational Severity - XDR Analytics BIOC - Rare process execution in organization

    10:24:18 AM - Low Severity - XDR BIOC - Suspicious AMSI DLL load location

    10:24:20 AM - Medium Severity - XDR Agent - WildFire Malware

    11:57:04 AM - High Severity - Correlation - Suspicious admin account creation

Which alert was responsible for the creation of the incident?

Options:

A.

Suspicious AMSI DLL load location


B.

Rare process execution in organization


C.

Suspicious admin account creation


D.

WildFire Malware


Expert Solution
Questions # 4:

For a critical incident, Cortex XSIAM suggests several playbooks which should have been executed automatically.

Why were the playbooks not executed?

Options:

A.

Misconfiguration of the connector instance has occurred.


B.

Playbook classifier was not configured for the alert type.


C.

Installation of the appropriate content pack was not completed.


D.

Playbook loggers were not configured for those alerts.


Expert Solution
Questions # 5:

In which two locations can mapping be configured for indicators? (Choose two.)

Options:

A.

Feed Integration settings


B.

Classification & Mapping tab


C.

STIX parser code


D.

Indicator Configuration in Object Setup


Expert Solution
Questions # 6:

In addition to defining the Rule Name and Severity Level, which step or set of steps accurately reflects how an analyst should configure an indicator prevention rule before reviewing and saving it?

Options:

A.

Filter and select file, IP address, and domain indicators.


B.

Select profiles for prevention


C.

Filter and select one or more file, IP address, and domain indicators.


D.

Select profiles for prevention


E.

Filter and select one or more SHA256 and MD5 indicators


F.

Filter and select indicators of any type.


Expert Solution
Questions # 7:

A Cortex XSIAM analyst is reading a blog that references an unfamiliar critical zero-day vulnerability. This vulnerability has been weaponized, and there is evidence that it is being exploited by threat actors targeting a customer's industry. Where can the analyst go within Cortex XSIAM to learn more about this vulnerability and any potential impacts on the customer environment?

Options:

A.

Threat Intel Management -> Sample Analysis


B.

Threat Intel Management -> Indicators


C.

Attack Surface -> Threat Response Center


D.

Attack Surface -> Attack Surface Rules


Expert Solution
Questions # 8:

In the Endpoint Data context menu of the Cortex XSIAM endpoints table, where will an analyst be able to determine which users accessed an endpoint via Live Terminal?

Options:

A.

View Endpoint Policy


B.

View Endpoint Logs


C.

View Incidents


D.

View Actions


Expert Solution
Questions # 9:

A threat hunter discovers a true negative event from a zero-day exploit that is using privilege escalation to launch "Malware pdf.exe". Which XQL query will always show the correct user context used to launch "Malware pdf.exe"?

Options:

A.

config case_sensitive = false | dataset = xdr_data | filter event_type = ENUM.PROCESS | filter action_process_image_name = "Malware.pdf.exe" | fields causality_actor_effective_username


B.

config case_sensitive = false | dataset = xdr_data | filter event_type = ENUM.PROCESS | filter action_process_image_name = "Malware.pdf.exe" | fields actor_process_username


C.

config case_sensitive = false | datamodel dataset = xdrdata | filter xdm.source.process.name = "Malware.pdf.exe" | fields xdm.target.user.username


D.

config case_sensitive = false | dataset = xdr_data | filter event_type = ENUM.PROCESS | filter action_process_image_name = "Malware.pdf.exe" | fields action_process_username


Expert Solution
Questions # 10:

Based on the artifact details in the image below, what can an analyst infer from the hexagon-shaped object with the exclamation mark (!) at the center?

Question # 10

Options:

A.

The WildFire verdict returned is "Low Confidence."


B.

The artifact verdict has changed from a previous state to "Malware."


C.

The malicious artifact was injected.


D.

The malware requires further analysis.


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions