Paloalto Networks SecOps-Pro Palo Alto Networks Security Operations Professional Exam Practice Test
Palo Alto Networks Security Operations Professional Questions and Answers
Which protocol is commonly used by Cortex XSOAR to automatically pull threat intelligence indicators from external TAXII servers?
Which action should an administrator take to create automated response actions when a user account is compromised? (Choose one answer)
What is the role of content packs in Cortex XSOAR?
Which response action in Cortex XSIAM would be unavailable to a SOC analyst investigating an incident involving a Linux server?
Which two types of content can be installed or upgraded through a Cortex XSIAM content pack? (Choose two.)
Which scripting language will allow the use of the Query Builder in Cortex XDR to show the top five accounts with failed Windows logons in the past 24 hours? (Choose one answer)
During a sophisticated cyber attack, a company experiences a stealthy, multivector intrusion that evades detection by traditional security tools. The company requires a solution that will correlate and analyze the disparate attack indicators across its network, endpoints, and cloud environments to uncover the full scope of the breach and take immediate automated response actions. Which solution should be recommended?
A company has a highly segmented network where the Cortex XSOAR server cannot directly communicate with an on-premises mail server. Which component should be deployed in the mail server's segment to facilitate integration?
When writing a custom XQL query to hunt for specific network anomalies, which part of the query syntax is used to define the specific table or source of data being searched?
What is the primary objective of a "Tier 1" analyst during the triage process?
Which response action in Cortex XDR allows a SOC analyst to remotely access an endpoint’s command-line interface to perform manual forensic data collection or system remediation?
What is a difference between cold storage and hot storage in Cortex?
During which phase of the NIST Incident Response lifecycle does a SOC team conduct a "Lessons Learned" meeting to improve future response efforts?
An analyst wants to create a detection rule that triggers when any process attempts to perform code injection into the lsass.exe process, regardless of whether the file hash of the source process is known to be malicious. Which type of rule should be created?
A customer is investigating a security incident in which unusual network traffic is observed and a malicious process is identified on an endpoint. Which Cortex XDR capability assists with correlating firewall network logs and endpoint data in this environment?
Which two functions are allowed when stitching logs in Cortex XDR? (Choose two.)
Which statement explains the difference between the Cortex Identity Threat Detection and Response (ITDR) module and Identity Analytics in Cortex XSIAM?
Which two types of tasks are supported in Cortex XSIAM playbooks? (Choose two.)