Weekend Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Paloalto Networks PSE-Cortex Palo Alto Networks System Engineer - Cortex Professional Exam Practice Test

Page: 1 / 17
Total 168 questions

Palo Alto Networks System Engineer - Cortex Professional Questions and Answers

Question 1

Why is reputation scoring important in the Threat Intelligence Module of Cortex XSOAR?

Options:

A.

It allows for easy comparison between open-source intelligence and paid services.

B.

It deconflicts prioritization when two vendors give different scores for the same indicator.

C.

It provides a mathematical model for combining scores from multiple vendors.

D.

It helps identify threat intelligence vendors with substandard content.

Question 2

Cortex XSOAR has extracted a malicious IP address involved in command-and-control traffic.

What is the best method to automatically block this IP from communicating with endpoints without requiring a configuration change on the firewall?

Options:

A.

Create a NetOps ticket requesting a configuration change to the firewall to block the IP.

B.

Add the IP address to an external dynamic list used by the firewall.

C.

Add the IP address to a threat intelligence management malicious IP list to elevate priority of future alerts.

D.

Block the IP address by creating a deny rule in the firewall.

Question 3

Which resource can a customer use to ensure that the Cortex XDR agent will operate correctly on their CentOS 07 servers?

Options:

A.

Administrator Guide

B.

Compatibility Matrix

C.

Release Notes

D.

LIVE community

Question 4

In Cortex XDR Prevent, which three matching criteria can be used to dynamically group endpoints? (Choose three.)

Options:

A.

Domain/workgroup membership

B.

quarantine status

C.

hostname

D.

OS

E.

attack threat intelligence tag

Question 5

If a customer activates a TMS tenant and has not purchased a Cortex Data Lake instance.

Palo Alto Networks will provide the customer with a free instance

What size is this free Cortex Data Lake instance?

Options:

A.

1 TB

B.

10 GB

C.

100 GB

D.

10 TB

Question 6

Which two statements apply to widgets? (Choose two.)

Options:

A.

All widgets are customizable.

B.

Dashboards cannot be shared across an organization.

C.

A widget can have its own time range that is different from the rest of the dashboard.

D.

Some widgets cannot be changed

Question 7

What does DBot use to score an indicator that has multiple reputation scores?

Options:

A.

most severe score

B.

undefined score

C.

average score

D.

least severe score

Question 8

In an Air-Gapped environment where the Docker package was manually installed after the Cortex XSOAR installation which action allows Cortex XSOAR to access Docker?

Options:

A.

create a “docker” group and add the "Cortex XSOAR" or "demisto" user to this group

B.

create a "Cortex XSOAR' or "demisto" group and add the "docker" user to this group

C.

disable the Cortex XSOAR service

D.

enable the docker service

Question 9

What is a benefit offered by Cortex XSOAR?

Options:

A.

It provides advanced customization capabilities.

B.

It provides real-time protection across hosts and containers.

C.

It enables consolidation of multiple point products into a single integrated service.

D.

It enables a comprehensive view of the customer environment with regard to digital employee productivity.

Question 10

A customer has purchased Cortex Data Lake storage with the following configuration, which requires 2 TB of Cortex Data Lake to order:

support for 300 total Cortex XDR clients all forwarding Cortex XDR data with 30-day retention

storage for higher fidelity logs to support Cortex XDR advanced analytics

The customer now needs 1000 total Cortex XDR clients, but continues with 300 clients forwarding Cortex XDR data with 30-day retention.

What is the new total storage requirement for Cortex Data Lake storage to order?

Options:

A.

16 TB

B.

4 TB

C.

8 TB

D.

2 TB

Question 11

What is a requirement when integrating Cortex XSIAM or Cortex XDR with other Palo Alto Networks products?

Options:

A.

Advanced logging service license

B.

HTTP Collector

C.

Devices in the same region as XDR/XSIAM

D.

XDR/XSIAM Broker VM

Question 12

What does Cortex Xpanse ingest from XDR endpoints?

Options:

A.

MAC addresses

B.

User-agent data

C.

Public IP addresses

D.

Hostnames

Question 13

Which integration allows searching and displaying Splunk results within Cortex XSOAR?

Options:

A.

SplunkPY integration

B.

Demisto App for Splunk integration

C.

XSOAR REST API integration

D.

Splunk integration

Question 14

Which command is used to add Cortex XSOAR "User1" to an investigation from the War Room command-line interface (CLI)?

Options:

A.

/invite User1

B.

#User1

C.

@User1

D.

!invite User1

Question 15

How does DBot score an indicator that has multiple reputation scores?

Options:

A.

uses the most severe score scores

B.

the reputation as undefined

C.

uses the average score

D.

uses the least severe score

Question 16

Which two entities can be created as a behavioral indicator of compromise (BIOC)? (Choose two.)

Options:

A.

process

B.

data

C.

event alert

D.

network

Question 17

What is the requirement for enablement of endpoint and network analytics in Cortex XDR?

Options:

A.

Cloud Identity Engine configured and enabled

B.

Network Mapper applet on the Broker VM configured and enabled

C.

Logs from at least 30 endpoints over a minimum of two weeks

D.

Windows DHCP logs ingested via a Cortex XDR collector

Question 18

Which option is required to prepare the VDI Golden Image?

Options:

A.

Configure the Golden Image as a persistent VDI

B.

Use the Cortex XDR VDI tool to obtain verdicts for all PE files

C.

Install the Cortex XOR Agent on the local machine

D.

Run the Cortex VDI conversion tool

Question 19

A test for a Microsoft exploit has been planned. After some research Internet Explorer 11 CVE-2016-0189 has been selected and a module in Metasploit has been identified

(exploit/windows/browser/ms16_051_vbscript)

The description and current configuration of the exploit are as follows;

Question # 19

What is the remaining configuration?

A)

Question # 19

B)

Question # 19

C)

Question # 19

D)

Question # 19

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 20

In addition to incident volume, which four critical factors must be evaluated to determine effectiveness and ROI on cybersecurity planning and technology?

Options:

A.

Analyst, training costs, duplicated, false positives

B.

People, staffing costs, duplicates, false positives

C.

People, security controls, mean time to detect, false positives

D.

Standard operating procedures, staffing costs, duplicates, mean time to respond

Question 21

When analyzing logs for indicators, which are used for only BIOC identification'?

Options:

A.

observed activity

B.

artifacts

C.

techniques

D.

error messages

Question 22

Within Cortex XSIAM, how does the integration of Attack Surface Management (ASM) provide a unified approach to security event management that traditional SIEMs typically lack?

Options:

A.

By providing a queryable dataset of ASM data for threat hunting

B.

By offering dashboards on ASM data within the management console

C.

By manually correlating of ASM data with security events

D.

By enriching incidents with ASM data for all internet-facing assets

Question 23

The customer has indicated they need EDR data collection capabilities, which Cortex XDR license is required?

Options:

A.

Cortex XDR Pro per TB

B.

Cortex XDR Prevent

C.

Cortex XDR Endpoint

D.

Cortex XDR Pro Per Endpoint

Question 24

Which product enables the discovery, exchange, and contribution of security automation playbooks, built into Cortex XSOAR?

Options:

A.

XSOAR Threat Intelligence Platform (TIP)

B.

XSOAR Automated Systems

C.

XSOAR Ticketing Systems

D.

XSOAR Marketplace

Question 25

A prospective customer is interested in Cortex XDR but is enable to run a product evaluation.

Which tool can be used instead to showcase Cortex XDR?

Options:

A.

Test Flight

B.

War Game

C.

Tech Rehearsal

D.

Capture the Flag

Question 26

Which two troubleshooting steps should be taken when an integration is failing to connect? (Choose two.)

Options:

A.

Ensure the playbook is set to run in quiet mode to minimize CPU usage and suppress errors

B.

Confirm the integration credentials or API keys are valid.

C.

Check the integration logs and enable a higher logging level, if needed, view the specific error.

D.

Confirm there are no dashboards or reports configured to use that integration instance.

Question 27

What is the primary function of an engine in Cortex XSOAR?

Options:

A.

To execute playbooks, scripts, commands, and integrations

B.

To manage multiple Cortex XSOAR tenants

C.

To provide a user interface for security analysts

D.

To store and manage incident data, remediation plans, and documentation

Question 28

A prospect has agreed to do a 30-day POC and asked to integrate with a product that Demisto currently does not have an integration with. How should you respond?

Options:

A.

Extend the POC window to allow the solution architects to build it

B.

Tell them we can build it with Professional Services.

C.

Tell them custom integrations are not created as part of the POC

D.

Agree to build the integration as part of the POC

Question 29

Which Cortex XDR capability prevents running malicious files from USB-connected removable equipment?

Options:

A.

Device customization

B.

Agent configuration

C.

Agent management

D.

Restrictions profile

Question 30

Where is the best place to find official resource material?

Options:

A.

Online forums

B.

Video series

C.

Administrator's guide

D.

Technical blogs

Question 31

Which aspect of Cortex Xpanse allows for visibility over remote workforce risks?

Options:

A.

The ability to identify customer assets on residential networks

B.

The use of a VPN connection to scan remote devices

C.

The deployment of a Cortex Xpanse aqent on the remote endpoint

D.

The presence of a portal for remote workers to use for posture checking

Question 32

Which two filter operators are available in Cortex XDR? (Choose two.)

Options:

A.

< >

B.

Contains

C.

=

D.

Is Contained By

Question 33

A customer is hesitant to directly connect their network to the Cortex platform due to compliance restrictions.

Which deployment method should the customer use to ensure secure connectivity between their network and the Cortex platform?

Options:

A.

Elasticsearch

B.

Broker VM

C.

Syslog collector

D.

Windows Event Collector

Question 34

The images show two versions of the same automation script and the results they produce when executed in Demisto. What are two possible causes of the exception thrown in the second Image? (Choose two.)

SUCCESS

Question # 34

Options:

A.

The modified scnpt was run in the wrong Docker image

B.

The modified script required a different parameter to run successfully.

C.

The dictionary was defined incorrectly in the second script.

D.

The modified script attempted to access a dictionary key that did not exist in the dictionary named "data”

Question 35

An administrator has a critical group of systems running Windows XP SP3 that cannot be upgraded The administrator wants to evaluate the ability of Traps to protect these systems and the word processing applications running on them

How should an administrator perform this evaluation?

Options:

A.

Gather information about the word processing applications and run them on a Windows XP SP3 VM Determine if any of the applications are vulnerable and run the exploit with an exploitation tool

B.

Run word processing exploits in a latest version of Windows VM in a controlled and isolated environment. Document indicators of compromise and compare to Traps protection capabilities

C.

Run a known 2015 flash exploit on a Windows XP SP3 VM. and run an exploitation tool that acts as a listener Use the results to demonstrate Traps capabilities

D.

Prepare the latest version of Windows VM Gather information about the word processing applications, determine if some of them are vulnerable and prepare a working exploit for at least one of them Execute with an exploitation tool

Question 36

The certificate used for decryption was installed as a trusted root CA certificate to ensure communication between the Cortex XDR Agent and Cortex XDR Management Console What action needs to be taken if the administrator determines the Cortex XDR Agents are not communicating with the Cortex XDR Management Console?

Options:

A.

add paloaltonetworks com to the SSL Decryption Exclusion list

B.

enable SSL decryption

C.

disable SSL decryption

D.

reinstall the root CA certificate

Question 37

What must a customer deploy prior to collecting endpoint data in Cortex XSIAM?

Options:

A.

Playbook

B.

Broker VM

C.

XDR agent

D.

External dynamic list

Question 38

In the DBotScore context field, which context key would differentiate between multiple entries for the same indicator in a multi-TIP environment?

Options:

A.

Vendor

B.

Type

C.

Using

D.

Brand

Question 39

An Administrator is alerted to a Suspicious Process Creation security event from multiple users.

The users believe that these events are false positives Which two steps should the administrator take to confirm the false positives and create an exception? (Choose two )

Options:

A.

With the Malware Security profile, disable the "Prevent Malicious Child Process Execution" module

B.

Within the Malware Security profile add the specific parent process, child process, and command line argument to the child process whitelist

C.

In the Cortex XDR security event, review the specific parent process, child process, and command line arguments

D.

Contact support and ask for a security exception.

Question 40

On a multi-tenanted v6.2 Cortex XSOAR server, which path leads to the server.log for "Tenant1"?

Options:

A.

/var/log/demisto/acc_Tenant1/server.log

B.

/var/log/demisto/Tenant1/server.log

C.

/var/lib/demisto/acc_Tenant1/server.log

D.

/var/lib/demisto/server.log

Question 41

Which statement applies to the differentiation of Cortex XDR from security information and event management (SIEM)?

Options:

A.

SIEM has access to raw logs from agents, where Cortex XDR traditionally only gets alerts.

B.

Cortex XDR allows just logging into the console and out of the box the events were blocked as a proactive approach.

C.

Cortex XDR requires a large and diverse team of analysts and up to several weeks for simple actions like creating an alert.

D.

SIEM has been entirely designed and built as cloud-native, with the ability to stitch together cloud logs, on-premises logs, third-party logs, and endpoint logs.

Question 42

Which two types of indicators of compromise (IOCs) are available for creation in Cortex XDR? (Choose two.)

Options:

A.

registry

B.

file path

C.

hash

D.

hostname

Question 43

What is the function of reputation scoring in the Threat Intelligence Module of Cortex XSIAM?

Options:

A.

It provides a statistical model for combining scores from multiple vendors

B.

It resolves conflicting scores from different vendors with the same indicator.

C.

It allows for comparison between open-source intelligence and paid services.

D.

It helps identify threat feed vendors with invalid content.

Question 44

Why is Premium Customer Success an important part of any Cortex bill of materials?

Options:

A.

It provides full implementation services.

B.

It provides managed threat hunting

C.

It provides instructor-led training courses.

D.

It provides expert-led configuration guidance.

Question 45

Why is it important to document notes from the Proof of Value (POV) for post-sales hand off?

Options:

A.

To generate additional training material for the POV’s production implementation

B.

To certify that the POV was completed and meets all customer requirements

C.

To allow implementation teams to bypass scooping exercises and shorten delivery time

D.

To ensure the implementation teams understand the customer use cases and priorities

Question 46

A Cortex XSIAM customer is unable to access their Cortex XSIAM tenant.

Which resource can the customer use to validate the uptime of Cortex XSIAM?

Options:

A.

Administrator Guide

B.

LIVEcommunity

C.

Release Notes

D.

Palo Alto Networks Status Page

Question 47

When a Demisto Engine is part of a Load-Balancing group it?

Options:

A.

Must be in a Load-Balancing group with at least another 3 members

B.

It must have port 443 open to allow the Demisto Server to establish a connection

C.

Can be used separately as an engine, only if connected to the Demisto Server directly

D.

Cannot be used separately and does not appear in the in the engines drop-down menu when configuring an integration instance

Question 48

What are two ways a customer can configure user authentication access Cortex Xpanse? (Choose two.)

Options:

A.

Secure Shell (SSH)

B.

SAML

C.

RADIUS

D.

Customer Support Portal

Question 49

What are two capabilities of a War Room? (Choose two.)

Options:

A.

create widgets for an investigation

B.

create playbooks for orchestration

C.

act as an audit trail for an investigation

D.

run ad-hoc automation commands

Question 50

How does an "inline" auto-extract task affect playbook execution?

Options:

A.

Doesn't wait until the indicators are enriched and continues executing the next step

B.

Doesn't wait until the indicators are enriched but populate context data before executing the next

C.

step. Wait until the indicators are enriched but doesn't populate context data before executing the next step.

D.

Wait until the indicators are enriched and populate context data before executing the next step.

Page: 1 / 17
Total 168 questions