Pass the Paloalto Networks Security Operations XSIAM-Analyst Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which attributes can be used as featured fields?

Options:

A.

Device-ID, URL, port, and indicator


B.

Endpoint-ID, alert source, critical asset, and threat name


C.

CIDR range, file hash, tags, and log source


D.

Hostnames, user names, IP addresses, and Active Directory


Questions # 12:

How would Incident Context be referenced in an alert War Room task or alert playbook task?

Options:

A.

${parentIncidentContext}


B.

${getparentIncidentFields}


C.

${parentIncidentFields}


D.

${getParentIncidentContext}


Questions # 13:

How can a SOC analyst highlight alerts generated on C-level executive hosts?

Options:

A.

Add the C-level executive users to the Executive Accounts asset role.


B.

Add a tag to the C-level executive users


C.

Create a Featured Alert field for the C-level hosts


D.

Create a dynamic group for the C-level hosts.


Questions # 14:

A Cortex XSIAM analyst is investigating a security incident involving a workstation after having deployed a Cortex XDR agent for 45 days. The incident details include the Cortex XDR Analytics Alert "Uncommon remote scheduled task creation." Which response will mitigate the threat?

Options:

A.

Initiate the endpoint isolate action to contain the threat.


B.

Revoke user access and conduct a user audit


C.

Prioritize blocking the source IP address to prevent further login attempts.


D.

Allow list the processes to reduce alert noise.


Questions # 15:

During an investigation of an alert with a completed playbook, it is determined that no indicators exist from the email "indicator@test.com" in the Key Assets & Artifacts tab of the parent incident. Which command will determine if Cortex XSIAM has been configured to extract indicators as expected?

Options:

A.

IcreateNewIndicator value="indicator@test.com"


B.

!extractIndicators text="indicator@test.com" auto-extract=inline


C.

!checkIndicatorExtraction text="indicator@test.com"


D.

Iemailvalue="indicator@test.com"


Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions