Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Paloalto Networks Security Operations SecOps-Pro Questions and answers with Dumpstech

Exam SecOps-Pro Premium Access

View all detail and faqs for the SecOps-Pro exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which solution will minimize mean time to resolution (MTTR) when, as a result of previous malware infection, a company’s Windows endpoint is suffering a small amount of file corruption and modified registry keys?

Options:

A.

Issue a new laptop from the help desk to expedite a clean system.

B.

Use Live Terminal to connect to the machine and upload files to replace the corrupted files.

C.

Use group policy objects to push new files and registry key changes to the endpoint.

D.

Use remediation suggestions to restore the affected files and registry modifications.

Questions # 12:

According to the Traffic Light Protocol (TLP) 2.0 standard, which classification is used for information that is restricted to the specific individuals involved in an investigation and cannot be shared further?

Options:

A.

TLP:CLEAR

B.

TLP:GREEN

C.

TLP:AMBER

D.

TLP:RED

Questions # 13:

An analyst identifies that a custom internal application is being incorrectly flagged as malicious by the Behavioral Threat Protection (BTP) module. What is the best way to stop these alerts while maintaining security for other applications?

Options:

A.

Disable the BTP module in the endpoint's Malware Profile.

B.

Add the application's file hash to the Global Block List.

C.

Create a specific Exception for the alert from the Incident View.

D.

Move the endpoint to a policy group with no security profiles.

Questions # 14:

Which two types of tasks are supported in Cortex XSIAM playbooks? (Choose two.)

Options:

A.

Sub-playbook

B.

Script creation

C.

Conditional

D.

Data collection

Questions # 15:

Which Cortex XSIAM feature uses machine learning to automatically group related alerts into a single, manageable incident to reduce alert fatigue?

Options:

A.

XDM Mapping

B.

Alert Stitching

C.

Incident Stitching

D.

Analytics Engine

Questions # 16:

Which protocol is commonly used by Cortex XSOAR to automatically pull threat intelligence indicators from external TAXII servers?

Options:

A.

STIX

B.

HTTPS

C.

TAXII

D.

FTP

Questions # 17:

What are the primary functions of the Causality Analysis Engine in Cortex XDR?

Options:

A.

To identify the root cause of alerts and provide a complete forensic timeline of events

B.

To prioritize critical alerts and reduce the overall number of alerts generated

C.

To perform regular system backups and restore operations in case of failure

D.

To determine only the root cause of an attack and automatically remediate threats

Questions # 18:

Why would a security engineer be unable to activate Cortex XDR analytics when configuring data sources and alert sensors during a Cortex XSIAM evaluation? (Choose one answer)

Options:

A.

The engineer needs to install the Analytics engine.

B.

Pathfinder must be activated before turning on analytics.

C.

Baseline requirements must be met before activating analytics.

D.

The engineer still needs to activate the identity Analytics engine.

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions