New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Paloalto Networks > Security Operations > XDR-Analyst

XDR-Analyst Palo Alto Networks XDR Analyst Question and Answers

Question # 4

Why would one threaten to encrypt a hypervisor or, potentially, a multiple number of virtual machines running on a server?

A.

To extort a payment from a victim or potentially embarrass the owners.

B.

To gain notoriety and potentially a consulting position.

C.

To better understand the underlying virtual infrastructure.

D.

To potentially perform a Distributed Denial of Attack.

Full Access
Question # 5

In the deployment of which Broker VM applet are you required to install a strong cipher SHA256-based SSL certificate?

A.

Agent Proxy

B.

Agent Installer and Content Caching

C.

Syslog Collector

D.

CSV Collector

Full Access
Question # 6

In incident-related widgets, how would you filter the display to only show incidents that were “starred”?

A.

Create a custom XQL widget

B.

This is not currently supported

C.

Create a custom report and filter on starred incidents

D.

Click the star in the widget

Full Access
Question # 7

Live Terminal uses which type of protocol to communicate with the agent on the endpoint?

A.

NetBIOS over TCP

B.

WebSocket

C.

UDP and a random port

D.

TCP, over port 80

Full Access
Question # 8

Which statement best describes how Behavioral Threat Protection (BTP) works?

A.

BTP injects into known vulnerable processes to detect malicious activity.

B.

BTP runs on the Cortex XDR and distributes behavioral signatures to all agents.

C.

BTP matches EDR data with rules provided by Cortex XDR.

D.

BTP uses machine Learning to recognize malicious activity even if it is not known.

Full Access
Question # 9

A Linux endpoint with a Cortex XDR Pro per Endpoint license and Enhanced Endpoint Data enabled has reported malicious activity, resulting in the creation of a file that you wish to delete. Which action could you take to delete the file?

A.

Manually remediate the problem on the endpoint in question.

B.

Open X2go from the Cortex XDR console and delete the file via X2go.

C.

Initiate Remediate Suggestions to automatically delete the file.

D.

Open an NFS connection from the Cortex XDR console and delete the file.

Full Access
Question # 10

Which of the following paths will successfully activate Remediation Suggestions?

A.

Incident View > Actions > Remediation Suggestions

B.

Causality View > Actions > Remediation Suggestions

C.

Alerts Table > Right-click on a process node > Remediation Suggestions

D.

Alerts Table > Right-click on an alert > Remediation Suggestions

Full Access
Question # 11

Which function describes the removal of a specific file from its location on a local or removable drive to a protected folder to prevent the file from being executed?

A.

Search & destroy

B.

Isolation

C.

Quarantine

D.

Flag for removal

Full Access
Question # 12

When is the wss (WebSocket Secure) protocol used?

A.

when the Cortex XDR agent downloads new security content

B.

when the Cortex XDR agent uploads alert data

C.

when the Cortex XDR agent connects to WildFire to upload files for analysis

D.

when the Cortex XDR agent establishes a bidirectional communication channel

Full Access
Question # 13

What is the outcome of creating and implementing an alert exclusion?

A.

The Cortex XDR agent will allow the process that was blocked to run on the endpoint.

B.

The Cortex XDR console will hide those alerts.

C.

The Cortex XDR agent will not create an alert for this event in the future.

D.

The Cortex XDR console will delete those alerts and block ingestion of them in the future.

Full Access
Question # 14

When using the “File Search and Destroy” feature, which of the following search hash type is supported?

A.

SHA256 hash of the file

B.

AES256 hash of the file

C.

MD5 hash of the file

D.

SHA1 hash of the file

Full Access
Question # 15

What are two purposes of “Respond to Malicious Causality Chains” in a Cortex XDR Windows Malware profile? (Choose two.)

A.

Automatically close the connections involved in malicious traffic.

B.

Automatically kill the processes involved in malicious activity.

C.

Automatically terminate the threads involved in malicious activity.

D.

Automatically block the IP addresses involved in malicious traffic.

Full Access
Question # 16

Which Exploit Protection Module (EPM) can be used to prevent attacks based on OS function?

A.

UASLR

B.

JIT Mitigation

C.

Memory Limit Heap Spray Check

D.

DLL Security

Full Access
Question # 17

What is the Wildfire analysis file size limit for Windows PE files?

A.

No Limit

B.

500MB

C.

100MB

D.

1GB

Full Access
Question # 18

To stop a network-based attack, any interference with a portion of the attack pattern is enough to prevent it from succeeding. Which statement is correct regarding the Cortex XDR Analytics module?

A.

It does not interfere with any portion of the pattern on the endpoint.

B.

It interferes with the pattern as soon as it is observed by the firewall.

C.

It does not need to interfere with the any portion of the pattern to prevent the attack.

D.

It interferes with the pattern as soon as it is observed on the endpoint.

Full Access
Question # 19

Where would you go to add an exception to exclude a specific file hash from examination by the Malware profile for a Windows endpoint?

A.

Find the Malware profile attached to the endpoint, Under Portable Executable and DLL Examination add the hash to the allow list.

B.

From the rules menu select new exception, fill out the criteria, choose the scope to apply it to, hit save.

C.

Find the exceptions profile attached to the endpoint, under process exceptions select local analysis, paste the hash and save.

D.

In the Action Center, choose Allow list, select new action, select add to allow list, add your hash to the list, and apply it.

Full Access
Question # 20

Which minimum Cortex XDR agent version is required for Kubernetes Cluster?

A.

Cortex XDR 6.1

B.

Cortex XDR 7.4

C.

Cortex XDR 7.5

D.

Cortex XDR 5.0

Full Access
Question # 21

As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to download Cobalt Strike on one of your servers. Days later, you learn about a massive ongoing supply chain attack. Using Cortex XDR you recognize that your server was compromised by the attack and that Cortex XDR prevented it. What steps can you take to ensure that the same protection is extended to all your servers?

A.

Create Behavioral Threat Protection (BTP) rules to recognize and prevent the activity.

B.

Enable DLL Protection on all servers but there might be some false positives.

C.

Create IOCs of the malicious files you have found to prevent their execution.

D.

Enable Behavioral Threat Protection (BTP) with cytool to prevent the attack from spreading.

Full Access
Question # 22

In the Cortex XDR console, from which two pages are you able to manually perform the agent upgrade action? (Choose two.)

A.

Asset Management

B.

Agent Installations

C.

Action Center

D.

Endpoint Administration

Full Access
Question # 23

Which statement is correct based on the report output below?

A.

Host Inventory Data Collection is enabled.

B.

3,297 total incidents have been detected.

C.

Forensic inventory data collection is enabled.

D.

133 agents have full disk encryption.

Full Access
Question # 24

What should you do to automatically convert leads into alerts after investigating a lead?

A.

Lead threats can't be prevented in the future because they already exist in the environment.

B.

Create IOC rules based on the set of the collected attribute-value pairs over the affected entities concluded during the lead hunting.

C.

Create BIOC rules based on the set of the collected attribute-value pairs over the affected entities concluded during the lead hunting.

D.

Build a search query using Query Builder or XQL using a list of lOCs.

Full Access
Question # 25

Network attacks follow predictable patterns. If you interfere with any portion of this pattern, the attack will be neutralized. Which of the following statements is correct?

A.

Cortex XDR Analytics allows to interfere with the pattern as soon as it is observed on the firewall.

B.

Cortex XDR Analytics does not interfere with the pattern as soon as it is observed on the endpoint.

C.

Cortex XDR Analytics does not have to interfere with the pattern as soon as it is observed on the endpoint in order to prevent the attack.

D.

Cortex XDR Analytics allows to interfere with the pattern as soon as it is observed on the endpoint.

Full Access
Question # 26

Which two types of exception profiles you can create in Cortex XDR? (Choose two.)

A.

exception profiles that apply to specific endpoints

B.

agent exception profiles that apply to specific endpoints

C.

global exception profiles that apply to all endpoints

D.

role-based profiles that apply to specific endpoints

Full Access
Question # 27

What types of actions you can execute with live terminal session?

A.

Manage Network configurations, Quarantine Files, Run PowerShell scripts

B.

Manage Processes, Manage Files, Run Operating System Commands, Run Ruby Commands and Scripts

C.

Apply patches, Reboot System, send notification for end user, Run Python Commands and Scripts

D.

Manage Processes, Manage Files, Run Operating System Commands, Run Python Commands and Scripts

Full Access