Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Paloalto Networks Security Operations XDR-Analyst Questions and answers with Dumpstech

Exam XDR-Analyst Premium Access

View all detail and faqs for the XDR-Analyst exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

What is the action taken out by Managed Threat Hunting team for Zero Day Exploits?

Options:

A.

MTH researches for threats in the tenant and generates a report with the findings.

B.

MTH researches for threats in the logs and reports to engineering.

C.

MTH runs queries and investigative actions and no further action is taken.

D.

MTH pushes content updates to prevent against the zero-day exploits.

Questions # 22:

Cortex XDR is deployed in the enterprise and you notice a cobalt strike attack via an ongoing supply chain compromise was prevented on 1 server. What steps can you take to ensure the same protection is extended to all your servers?

Options:

A.

Conduct a thorough Endpoint Malware scan.

B.

Enable DLL Protection on all servers but there might be some false positives.

C.

Enable Behavioral Threat Protection (BTP) with cytool to prevent the attack from spreading.

D.

Create lOCs of the malicious files you have found to prevent their execution.

Questions # 23:

Which of the following protection modules is checked first in the Cortex XDR Windows agent malware protection flow?

Options:

A.

Hash Verdict Determination

B.

Behavioral Threat Protection

C.

Restriction Policy

D.

Child Process Protection

Questions # 24:

What kind of malware uses encryption, data theft, denial of service, and possibly harassment to take advantage of a victim?

Options:

A.

Ransomware

B.

Worm

C.

Keylogger

D.

Rootkit

Questions # 25:

An attacker tries to load dynamic libraries on macOS from an unsecure location. Which Cortex XDR module can prevent this attack?

Options:

A.

DDL Security

B.

Hot Patch Protection

C.

Kernel Integrity Monitor (KIM)

D.

Dylib Hijacking

Questions # 26:

Which of the following policy exceptions applies to the following description?

‘An exception allowing specific PHP files’

Options:

A.

Support exception

B.

Local file threat examination exception

C.

Behavioral threat protection rule exception

D.

Process exception

Questions # 27:

To stop a network-based attack, any interference with a portion of the attack pattern is enough to prevent it from succeeding. Which statement is correct regarding the Cortex XDR Analytics module?

Options:

A.

It does not interfere with any portion of the pattern on the endpoint.

B.

It interferes with the pattern as soon as it is observed by the firewall.

C.

It does not need to interfere with the any portion of the pattern to prevent the attack.

D.

It interferes with the pattern as soon as it is observed on the endpoint.

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions