Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Paloalto Networks Security Operations XDR-Analyst Questions and answers with Dumpstech

Exam XDR-Analyst Premium Access

View all detail and faqs for the XDR-Analyst exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Where would you go to add an exception to exclude a specific file hash from examination by the Malware profile for a Windows endpoint?

Options:

A.

Find the Malware profile attached to the endpoint, Under Portable Executable and DLL Examination add the hash to the allow list.

B.

From the rules menu select new exception, fill out the criteria, choose the scope to apply it to, hit save.

C.

Find the exceptions profile attached to the endpoint, under process exceptions select local analysis, paste the hash and save.

D.

In the Action Center, choose Allow list, select new action, select add to allow list, add your hash to the list, and apply it.

Questions # 12:

How can you pivot within a row to Causality view and Timeline views for further investigate?

Options:

A.

Using the Open Card Only

B.

Using the Open Card and Open Timeline actions respectively

C.

You can't pivot within a row to Causality view and Timeline views

D.

Using Open Timeline Actions Only

Questions # 13:

What is the purpose of the Unit 42 team?

Options:

A.

Unit 42 is responsible for automation and orchestration of products

B.

Unit 42 is responsible for the configuration optimization of the Cortex XDR server

C.

Unit 42 is responsible for threat research, malware analysis and threat hunting

D.

Unit 42 is responsible for the rapid deployment of Cortex XDR agents

Questions # 14:

You can star security events in which two ways? (Choose two.)

Options:

A.

Create an alert-starring configuration.

B.

Create an Incident-starring configuration.

C.

Manually star an alert.

D.

Manually star an Incident.

Questions # 15:

Cortex XDR Analytics can alert when detecting activity matching the following MITRE ATT&CKTM techniques.

Options:

A.

Exfiltration, Command and Control, Collection

B.

Exfiltration, Command and Control, Privilege Escalation

C.

Exfiltration, Command and Control, Impact

D.

Exfiltration, Command and Control, Lateral Movement

Questions # 16:

Which of the following is NOT a precanned script provided by Palo Alto Networks?

Options:

A.

delete_file

B.

quarantine_file

C.

process_kill_name

D.

list_directories

Questions # 17:

What is an example of an attack vector for ransomware?

Options:

A.

Performing DNS queries for suspicious domains

B.

Performing SSL Decryption on an endpoint

C.

Phishing emails containing malicious attachments

D.

A URL filtering feature enabled on a firewall

Questions # 18:

In the deployment of which Broker VM applet are you required to install a strong cipher SHA256-based SSL certificate?

Options:

A.

Agent Proxy

B.

Agent Installer and Content Caching

C.

Syslog Collector

D.

CSV Collector

Questions # 19:

Which module provides the best visibility to view vulnerabilities?

Options:

A.

Live Terminal module

B.

Device Control Violations module

C.

Host Insights module

D.

Forensics module

Questions # 20:

Which statement is true based on the following Agent Auto Upgrade widget?

Question # 20

Options:

A.

There are a total of 689 Up To Date agents.

B.

Agent Auto Upgrade was enabled but not on all endpoints.

C.

Agent Auto Upgrade has not been enabled.

D.

There are more agents in Pending status than In Progress status.

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions