Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Paloalto Networks XDR-Analyst Palo Alto Networks XDR Analyst Exam Practice Test

Demo: 27 questions
Total 91 questions

Palo Alto Networks XDR Analyst Questions and Answers

Question 1

Which statement best describes how Behavioral Threat Protection (BTP) works?

Options:

A.

BTP injects into known vulnerable processes to detect malicious activity.

B.

BTP runs on the Cortex XDR and distributes behavioral signatures to all agents.

C.

BTP matches EDR data with rules provided by Cortex XDR.

D.

BTP uses machine Learning to recognize malicious activity even if it is not known.

Question 2

Under which conditions is Local Analysis evoked to evaluate a file before the file is allowed to run?

Options:

A.

The endpoint is disconnected or the verdict from WildFire is of a type benign.

B.

The endpoint is disconnected or the verdict from WildFire is of a type unknown.

C.

The endpoint is disconnected or the verdict from WildFire is of a type malware.

D.

The endpoint is disconnected or the verdict from WildFire is of a type grayware.

Question 3

What functionality of the Broker VM would you use to ingest third-party firewall logs to the Cortex Data Lake?

Options:

A.

Netflow Collector

B.

Syslog Collector

C.

DB Collector

D.

Pathfinder

Question 4

Which search methods is supported by File Search and Destroy?

Options:

A.

File Seek and Destroy

B.

File Search and Destroy

C.

File Seek and Repair

D.

File Search and Repair

Question 5

What is an example of an attack vector for ransomware?

Options:

A.

Performing DNS queries for suspicious domains

B.

Performing SSL Decryption on an endpoint

C.

Phishing emails containing malicious attachments

D.

A URL filtering feature enabled on a firewall

Question 6

Which minimum Cortex XDR agent version is required for Kubernetes Cluster?

Options:

A.

Cortex XDR 6.1

B.

Cortex XDR 7.4

C.

Cortex XDR 7.5

D.

Cortex XDR 5.0

Question 7

Phishing belongs to which of the following MITRE ATT&CK tactics?

Options:

A.

Initial Access, Persistence

B.

Persistence, Command and Control

C.

Reconnaissance, Persistence

D.

Reconnaissance, Initial Access

Question 8

What are two purposes of “Respond to Malicious Causality Chains” in a Cortex XDR Windows Malware profile? (Choose two.)

Options:

A.

Automatically close the connections involved in malicious traffic.

B.

Automatically kill the processes involved in malicious activity.

C.

Automatically terminate the threads involved in malicious activity.

D.

Automatically block the IP addresses involved in malicious traffic.

Question 9

The Cortex XDR console has triggered an incident, blocking a vitally important piece of software in your organization that is known to be benign. Which of the following options would prevent Cortex XDR from blocking this software in the future, for all endpoints in your organization?

Options:

A.

Create an individual alert exclusion.

B.

Create a global inclusion.

C.

Create an endpoint-specific exception.

D.

Create a global exception.

Question 10

Where can SHA256 hash values be used in Cortex XDR Malware Protection Profiles?

Options:

A.

in the macOS Malware Protection Profile to indicate allowed signers

B.

in the Linux Malware Protection Profile to indicate allowed Java libraries

C.

SHA256 hashes cannot be used in Cortex XDR Malware Protection Profiles

D.

in the Windows Malware Protection Profile to indicate allowed executables

Question 11

What kind of the threat typically encrypts user files?

Options:

A.

ransomware

B.

SQL injection attacks

C.

Zero-day exploits

D.

supply-chain attacks

Question 12

What is the maximum number of agents one Broker VM local agent applet can support?

Options:

A.

5,000

B.

10,000

C.

15,000

D.

20,000

Question 13

When selecting multiple Incidents at a time, what options are available from the menu when a user right-clicks the incidents? (Choose two.)

Options:

A.

Assign incidents to an analyst in bulk.

B.

Change the status of multiple incidents.

C.

Investigate several Incidents at once.

D.

Delete the selected Incidents.

Question 14

If you have an isolated network that is prevented from connecting to the Cortex Data Lake, which type of Broker VM setup can you use to facilitate the communication?

Options:

A.

Broker VM Pathfinder

B.

Local Agent Proxy

C.

Local Agent Installer and Content Caching

D.

Broker VM Syslog Collector

Question 15

Cortex XDR is deployed in the enterprise and you notice a cobalt strike attack via an ongoing supply chain compromise was prevented on 1 server. What steps can you take to ensure the same protection is extended to all your servers?

Options:

A.

Conduct a thorough Endpoint Malware scan.

B.

Enable DLL Protection on all servers but there might be some false positives.

C.

Enable Behavioral Threat Protection (BTP) with cytool to prevent the attack from spreading.

D.

Create lOCs of the malicious files you have found to prevent their execution.

Question 16

Which license is required when deploying Cortex XDR agent on Kubernetes Clusters as a DaemonSet?

Options:

A.

Cortex XDR Pro per TB

B.

Host Insights

C.

Cortex XDR Pro per Endpoint

D.

Cortex XDR Cloud per Host

Question 17

Which two types of exception profiles you can create in Cortex XDR? (Choose two.)

Options:

A.

exception profiles that apply to specific endpoints

B.

agent exception profiles that apply to specific endpoints

C.

global exception profiles that apply to all endpoints

D.

role-based profiles that apply to specific endpoints

Question 18

What is the purpose of the Unit 42 team?

Options:

A.

Unit 42 is responsible for automation and orchestration of products

B.

Unit 42 is responsible for the configuration optimization of the Cortex XDR server

C.

Unit 42 is responsible for threat research, malware analysis and threat hunting

D.

Unit 42 is responsible for the rapid deployment of Cortex XDR agents

Question 19

What is the purpose of targeting software vendors in a supply-chain attack?

Options:

A.

to take advantage of a trusted software delivery method.

B.

to steal users’ login credentials.

C.

to access source code.

D.

to report Zero-day vulnerabilities.

Question 20

What should you do to automatically convert leads into alerts after investigating a lead?

Options:

A.

Lead threats can't be prevented in the future because they already exist in the environment.

B.

Create IOC rules based on the set of the collected attribute-value pairs over the affected entities concluded during the lead hunting.

C.

Create BIOC rules based on the set of the collected attribute-value pairs over the affected entities concluded during the lead hunting.

D.

Build a search query using Query Builder or XQL using a list of lOCs.

Question 21

You can star security events in which two ways? (Choose two.)

Options:

A.

Create an alert-starring configuration.

B.

Create an Incident-starring configuration.

C.

Manually star an alert.

D.

Manually star an Incident.

Question 22

Which of the following is an example of a successful exploit?

Options:

A.

connecting unknown media to an endpoint that copied malware due to Autorun.

B.

a user executing code which takes advantage of a vulnerability on a local service.

C.

identifying vulnerable services on a server.

D.

executing a process executable for well-known and signed software.

Question 23

Which of the following Live Terminal options are available for Android systems?

Options:

A.

Live Terminal is not supported.

B.

Stop an app.

C.

Run APK scripts.

D.

Run Android commands.

Question 24

How can you pivot within a row to Causality view and Timeline views for further investigate?

Options:

A.

Using the Open Card Only

B.

Using the Open Card and Open Timeline actions respectively

C.

You can't pivot within a row to Causality view and Timeline views

D.

Using Open Timeline Actions Only

Question 25

Which statement is correct based on the report output below?

Options:

A.

Host Inventory Data Collection is enabled.

B.

3,297 total incidents have been detected.

C.

Forensic inventory data collection is enabled.

D.

133 agents have full disk encryption.

Question 26

What motivation do ransomware attackers have for returning access to systems once their victims have paid?

Options:

A.

There is organized crime governance among attackers that requires the return of access to remain in good standing. B. Nation-states enforce the return of system access through the use of laws and regulation.

B.

Failure to restore access to systems undermines the scheme because others will not believe their valuables would be returned.

C.

The ransomware attackers hope to trace the financial trail back and steal more from traditional banking institutions. -

Question 27

Which statement is true based on the following Agent Auto Upgrade widget?

Options:

A.

There are a total of 689 Up To Date agents.

B.

Agent Auto Upgrade was enabled but not on all endpoints.

C.

Agent Auto Upgrade has not been enabled.

D.

There are more agents in Pending status than In Progress status.

Demo: 27 questions
Total 91 questions