Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = pass65

Pass the Paloalto Networks Security Operations XDR-Analyst Questions and answers with Dumpstech

Exam XDR-Analyst Premium Access

View all detail and faqs for the XDR-Analyst exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which type of IOC can you define in Cortex XDR?

Options:

A.

Destination IP Address

B.

Source IP Address

C.

Source port

D.

Destination IP Address: Destination

Questions # 2:

Which Type of IOC can you define in Cortex XDR?

Options:

A.

destination port

B.

e-mail address

C.

full path

D.

App-ID

Questions # 3:

When creating a BIOC rule, which XQL query can be used?

Options:

A.

dataset = xdr_data

| filter event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

B.

dataset = xdr_data

| filter event_type = PROCESS and

event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

C.

dataset = xdr_data

| filter action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

| fields action_process_image

D.

dataset = xdr_data

| filter event_behavior = true

event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

Questions # 4:

When using the “File Search and Destroy” feature, which of the following search hash type is supported?

Options:

A.

SHA256 hash of the file

B.

AES256 hash of the file

C.

MD5 hash of the file

D.

SHA1 hash of the file

Questions # 5:

When is the wss (WebSocket Secure) protocol used?

Options:

A.

when the Cortex XDR agent downloads new security content

B.

when the Cortex XDR agent uploads alert data

C.

when the Cortex XDR agent connects to WildFire to upload files for analysis

D.

when the Cortex XDR agent establishes a bidirectional communication channel

Questions # 6:

Which search methods is supported by File Search and Destroy?

Options:

A.

File Seek and Destroy

B.

File Search and Destroy

C.

File Seek and Repair

D.

File Search and Repair

Questions # 7:

Which Exploit Prevention Module (EPM) provides better entropy for randomization of memory locations?

Options:

A.

Memory Limit Heap spray check

B.

UASLR

C.

JIT Mitigation

D.

DLL Security

Questions # 8:

Which license is required when deploying Cortex XDR agent on Kubernetes Clusters as a DaemonSet?

Options:

A.

Cortex XDR Pro per TB

B.

Host Insights

C.

Cortex XDR Pro per Endpoint

D.

Cortex XDR Cloud per Host

Questions # 9:

Which statement best describes how Behavioral Threat Protection (BTP) works?

Options:

A.

BTP injects into known vulnerable processes to detect malicious activity.

B.

BTP runs on the Cortex XDR and distributes behavioral signatures to all agents.

C.

BTP matches EDR data with rules provided by Cortex XDR.

D.

BTP uses machine Learning to recognize malicious activity even if it is not known.

Questions # 10:

Which of the following best defines the Windows Registry as used by the Cortex XDR agent?

Options:

A.

a hierarchical database that stores settings for the operating system and for applications

B.

a system of files used by the operating system to commit memory that exceeds the available hardware resources. Also known as the “swap”

C.

a central system, available via the internet, for registering officially licensed versions of software to prove ownership

D.

a ledger for maintaining accurate and up-to-date information on total disk usage and disk space remaining available to the operating system

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions