Pass the Paloalto Networks Security Operations XSIAM-Analyst Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

What is the cause when alerts generated by a correlation rule are not creating an incident?

Options:

A.

The rule is configured with alert severity below Medium.


B.

The rule does not have a drill-down query configured


C.

The rule has alert suppression enabled


D.

The rule is using the preconfigured Cortex XSIAM alert field mapping.


Questions # 2:

Which two methods can be used to create and share queries into the Query Library? (Choose two.)

Options:

A.

From the Query Center, locate the query to save to a personal Query Library. Right-click, and select "Save query to library". Enable the "Share with others" option


B.

From XQL Search, locate the query to save to a personal Query Library. Right-click, and select "Save query to library". Enable the "Share with others" option


C.

From XQL Search, in the XQL query field, define the parameters of the query. Save as, and choose the "Query to Library" option. Enable the "Share with others" option


D.

From the Query Center, in the XQL query field, define the parameters of the query. Save as, and choose the "Query to Library" option. Enable the "Share with others" option


Questions # 3:

In which two locations can mapping be configured for indicators? (Choose two.)

Options:

A.

Feed Integration settings


B.

Classification & Mapping tab


C.

STIX parser code


D.

Indicator Configuration in Object Setup


Questions # 4:

Which statement applies to a low-severity alert when a playbook trigger has been configured?

Options:

A.

The alert playbook will automatically run when grouped in an incident.


B.

The alert playbook will run if the severity increases to medium or higher.


C.

The alert playbook can be manually run by an analyst.


D.

Only low-severity analytics alerts will automatically run playbooks.


Questions # 5:

SCENARIO:

A security analyst has been assigned a ticket from the help desk stating that users are experiencing errors when attempting to open files on a specific network share. These errors state that the file format cannot be opened. IT has verified that the file server is online and functioning, but that all files have unusual extensions attached to them.

The security analyst reviews alerts within Cortex XSIAM and identifies malicious activity related to a possible ransomware attack on the file server. This incident is then escalated to the incident response team for further investigation.

Upon reviewing the incident, the responders confirm that ransomware was successfully executed on the file server. Other details of the attack are noted below:

• An unpatched vulnerability on an externally facing web server was exploited for initial access

• The attackers successfully used Mimikatz to dump sensitive credentials that were used for privilege escalation

• PowerShell was used on a Windows server for additional discovery, as well as lateral movement to other systems

• The attackers executed SystemBC RAT on multiple systems to maintain remote access

• Ransomware payload was downloaded on the file server via an external site "file io"

QUESTION STATEMENT:

The incident responders are attempting to determine why Mimikatz was able to successfully run during the attack.

Which exploit protection profile in Cortex XSIAM should be reviewed to ensure it is configured with an Action Mode of Block?

Options:

A.

Logical Exploits Protection


B.

Browser Exploits Protection


C.

Known Vulnerable Process Protection


D.

Operating System Exploit Protection


Questions # 6:

Which two actions will allow a security analyst to review updated commands from the core pack and interpret the results without altering the incident audit? (Choose two)

Options:

A.

Run the core commands directly from the playground and invite other collaborators.


B.

Run the core commands directly from the Command and Scripts menu inside playground


C.

Create a playbook with the commands and run it from within the War Room


D.

Run the core commands directly by typing them into the playground CLI.


Questions # 7:

A Cortex XSIAM analyst is reading a blog that references an unfamiliar critical zero-day vulnerability. This vulnerability has been weaponized, and there is evidence that it is being exploited by threat actors targeting a customer's industry. Where can the analyst go within Cortex XSIAM to learn more about this vulnerability and any potential impacts on the customer environment?

Options:

A.

Threat Intel Management -> Sample Analysis


B.

Threat Intel Management -> Indicators


C.

Attack Surface -> Threat Response Center


D.

Attack Surface -> Attack Surface Rules


Questions # 8:

For a critical incident, Cortex XSIAM suggests several playbooks which should have been executed automatically.

Why were the playbooks not executed?

Options:

A.

Misconfiguration of the connector instance has occurred.


B.

Playbook classifier was not configured for the alert type.


C.

Installation of the appropriate content pack was not completed.


D.

Playbook loggers were not configured for those alerts.


Questions # 9:

Which type of task can be used to create a decision tree in a playbook?

Options:

A.

Sub-playbook


B.

Standard


C.

Job


D.

Conditional


Questions # 10:

Based on the artifact details in the image below, what can an analyst infer from the hexagon-shaped object with the exclamation mark (!) at the center?

Question # 10

Options:

A.

The WildFire verdict returned is "Low Confidence."


B.

The artifact verdict has changed from a previous state to "Malware."


C.

The malicious artifact was injected.


D.

The malware requires further analysis.


Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions