Spring Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Paloalto Networks SecOps-Pro Palo Alto Networks Security Operations Professional Exam Practice Test

Page: 1 / 6
Total 60 questions

Palo Alto Networks Security Operations Professional Questions and Answers

Question 1

Which protocol is commonly used by Cortex XSOAR to automatically pull threat intelligence indicators from external TAXII servers?

Options:

A.

STIX

B.

HTTPS

C.

TAXII

D.

FTP

Question 2

Which action should an administrator take to create automated response actions when a user account is compromised? (Choose one answer)

Options:

A.

Map the events as a type of Cortex XSOAR incident, then run a playbook.

B.

Run a custom script from the Cortex XDR script library.

C.

Create a script in Cortex XSOAR that will run a playbook based on the scenario.

D.

Create playbook triggers in Cortex XSIAM and run playbooks for each alert.

Question 3

What is the role of content packs in Cortex XSOAR?

Options:

A.

To provide pre-built bundles for supporting security orchestration use cases

B.

To support technical support teams with relevant information required to troubleshoot

C.

To serve as a central location for installing, exchanging, and contributing content

D.

To serve as a major software versioning update

Question 4

Which response action in Cortex XSIAM would be unavailable to a SOC analyst investigating an incident involving a Linux server?

Options:

A.

File search and destroy

B.

Live Terminal session initiation

C.

Running a script

D.

Halting network access

Question 5

Which two types of content can be installed or upgraded through a Cortex XSIAM content pack? (Choose two.)

Options:

A.

Analytics alerts

B.

Playbook triggers

C.

Data Model rules

D.

Behavioral Threat Protection (BTP)

Question 6

Which scripting language will allow the use of the Query Builder in Cortex XDR to show the top five accounts with failed Windows logons in the past 24 hours? (Choose one answer)

Options:

A.

PowerShell

B.

JavaScript

C.

XQL

D.

Python

Question 7

During a sophisticated cyber attack, a company experiences a stealthy, multivector intrusion that evades detection by traditional security tools. The company requires a solution that will correlate and analyze the disparate attack indicators across its network, endpoints, and cloud environments to uncover the full scope of the breach and take immediate automated response actions. Which solution should be recommended?

Options:

A.

XDR

B.

SIEM

C.

EDR

D.

XSOAR

Question 8

A company has a highly segmented network where the Cortex XSOAR server cannot directly communicate with an on-premises mail server. Which component should be deployed in the mail server's segment to facilitate integration?

Options:

A.

Broker VM

B.

XSOAR Engine

C.

Cortex Gateway

D.

XSOAR Proxy

Question 9

When writing a custom XQL query to hunt for specific network anomalies, which part of the query syntax is used to define the specific table or source of data being searched?

Options:

A.

filter

B.

dataset

C.

fields

D.

comp

Question 10

What is the primary objective of a "Tier 1" analyst during the triage process?

Options:

A.

Performing deep-dive memory forensics on a compromised server.

B.

Negotiating with ransomware actors to recover encrypted data.

C.

Determining the validity of an alert and its urgency for escalation.

D.

Rewriting the company's information security policy.

Question 11

Which response action in Cortex XDR allows a SOC analyst to remotely access an endpoint’s command-line interface to perform manual forensic data collection or system remediation?

Options:

A.

Remote Shell

B.

Live Terminal

C.

Action Center

D.

Python Console

Question 12

What is a difference between cold storage and hot storage in Cortex?

Options:

A.

Cold storage is required, while hot storage is optional.

B.

Cold storage and hot storage can be stored in different cloud locations.

C.

Logs in cold storage have more details than logs stored in hot storage.

D.

Querying logs in cold storage takes more time than querying logs in hot storage.

Question 13

During which phase of the NIST Incident Response lifecycle does a SOC team conduct a "Lessons Learned" meeting to improve future response efforts?

Options:

A.

Preparation

B.

Detection and Analysis

C.

Containment, Eradication, and Recovery

D.

Post-Incident Activity

Question 14

An analyst wants to create a detection rule that triggers when any process attempts to perform code injection into the lsass.exe process, regardless of whether the file hash of the source process is known to be malicious. Which type of rule should be created?

Options:

A.

IOC (Indicator of Compromise)

B.

BIOC (Behavioral Indicator of Compromise)

C.

Correlation Rule

D.

Analytics Alert

Question 15

A customer is investigating a security incident in which unusual network traffic is observed and a malicious process is identified on an endpoint. Which Cortex XDR capability assists with correlating firewall network logs and endpoint data in this environment?

Options:

A.

Log stitching

B.

User authentication management

C.

Indicator of compromise (IOC) rule

D.

Analytics

Question 16

Which two functions are allowed when stitching logs in Cortex XDR? (Choose two.)

Options:

A.

Providing real-time threat prevention or remediation of threats

B.

Creating granular BIOC and correlation rules

C.

Enabling creation of custom scripts for remediation of security incidents

D.

Running investigation queries based on combined network and endpoint events

Question 17

Which statement explains the difference between the Cortex Identity Threat Detection and Response (ITDR) module and Identity Analytics in Cortex XSIAM?

Options:

A.

Identity Analytics detects suspicious logins and MFA spamming, whereas the ITDR module defends against anomalous insider activity and exfiltration to physical devices.

B.

The ITDR module is designed for compliance reporting, while Identity Analytics focuses on detecting and responding to brute force attacks and excessive logins.

C.

Identity Analytics provides prevention of suspicious logins, whereas the ITDR module focuses on advanced threat vectors.

D.

The ITDR module provides basic security event monitoring, while Identity Analytics focuses on integrating various security tools.

Question 18

Which two types of tasks are supported in Cortex XSIAM playbooks? (Choose two.)

Options:

A.

Sub-playbook

B.

Script creation

C.

Conditional

D.

Data collection

Page: 1 / 6
Total 60 questions