New Year Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Paloalto Networks XDR-Analyst Palo Alto Networks XDR Analyst Exam Practice Test

Page: 1 / 9
Total 91 questions

Palo Alto Networks XDR Analyst Questions and Answers

Question 1

Which engine, of the following, in Cortex XDR determines the most relevant artifacts in each alert and aggregates all alerts related to an event into an incident?

Options:

A.

Sensor Engine

B.

Causality Analysis Engine

C.

Log Stitching Engine

D.

Causality Chain Engine

Question 2

Which statement regarding scripts in Cortex XDR is true?

Options:

A.

Any version of Python script can be run.

B.

The level of risk is assigned to the script upon import.

C.

Any script can be imported including Visual Basic (VB) scripts.

D.

The script is run on the machine uploading the script to ensure that it is operational.

Question 3

Where would you go to add an exception to exclude a specific file hash from examination by the Malware profile for a Windows endpoint?

Options:

A.

Find the Malware profile attached to the endpoint, Under Portable Executable and DLL Examination add the hash to the allow list.

B.

From the rules menu select new exception, fill out the criteria, choose the scope to apply it to, hit save.

C.

Find the exceptions profile attached to the endpoint, under process exceptions select local analysis, paste the hash and save.

D.

In the Action Center, choose Allow list, select new action, select add to allow list, add your hash to the list, and apply it.

Question 4

What kind of the threat typically encrypts user files?

Options:

A.

ransomware

B.

SQL injection attacks

C.

Zero-day exploits

D.

supply-chain attacks

Question 5

When creating a custom XQL query in a dashboard, how would a user save that XQL query to the Widget Library?

Options:

A.

Click the three dots on the widget and then choose “Save” and this will link the query to the Widget Library.

B.

This isn’t supported, you have to exit the dashboard and go into the Widget Library first to create it.

C.

Click on “Save to Action Center” in the dashboard and you will be prompted to give the query a name and description.

D.

Click on “Save to Widget Library” in the dashboard and you will be prompted to give the query a name and description.

Question 6

Which of the following protection modules is checked first in the Cortex XDR Windows agent malware protection flow?

Options:

A.

Hash Verdict Determination

B.

Behavioral Threat Protection

C.

Restriction Policy

D.

Child Process Protection

Question 7

What are two purposes of “Respond to Malicious Causality Chains” in a Cortex XDR Windows Malware profile? (Choose two.)

Options:

A.

Automatically close the connections involved in malicious traffic.

B.

Automatically kill the processes involved in malicious activity.

C.

Automatically terminate the threads involved in malicious activity.

D.

Automatically block the IP addresses involved in malicious traffic.

Question 8

Which version of python is used in live terminal?

Options:

A.

Python 2 and 3 with standard Python libraries

B.

Python 2 and 3 with specific XDR Python libraries developed by Palo Alto Networks

C.

Python 3 with specific XDR Python libraries developed by Palo Alto Networks

D.

Python 3 with standard Python libraries

Question 9

In Windows and macOS you need to prevent the Cortex XDR Agent from blocking execution of a file based on the digital signer. What is one way to add an exception for the singer?

Options:

A.

In the Restrictions Profile, add the file name and path to the Executable Files allow list.

B.

Create a new rule exception and use the singer as the characteristic.

C.

Add the signer to the allow list in the malware profile.

D.

Add the signer to the allow list under the action center page.

Question 10

What motivation do ransomware attackers have for returning access to systems once their victims have paid?

Options:

A.

There is organized crime governance among attackers that requires the return of access to remain in good standing. B. Nation-states enforce the return of system access through the use of laws and regulation.

B.

Failure to restore access to systems undermines the scheme because others will not believe their valuables would be returned.

C.

The ransomware attackers hope to trace the financial trail back and steal more from traditional banking institutions. -

Question 11

An attacker tries to load dynamic libraries on macOS from an unsecure location. Which Cortex XDR module can prevent this attack?

Options:

A.

DDL Security

B.

Hot Patch Protection

C.

Kernel Integrity Monitor (KIM)

D.

Dylib Hijacking

Question 12

What is by far the most common tactic used by ransomware to shut down a victim’s operation?

Options:

A.

preventing the victim from being able to access APIs to cripple infrastructure

B.

denying traffic out of the victims network until payment is received

C.

restricting access to administrative accounts to the victim

D.

encrypting certain files to prevent access by the victim

Question 13

While working the alerts involved in a Cortex XDR incident, an analyst has found that every alert in this incident requires an exclusion. What will the Cortex XDR console automatically do to this incident if all alerts contained have exclusions?

Options:

A.

mark the incident as Unresolved

B.

create a BIOC rule excluding this behavior

C.

create an exception to prevent future false positives

D.

mark the incident as Resolved – False Positive

Question 14

Which statement best describes how Behavioral Threat Protection (BTP) works?

Options:

A.

BTP injects into known vulnerable processes to detect malicious activity.

B.

BTP runs on the Cortex XDR and distributes behavioral signatures to all agents.

C.

BTP matches EDR data with rules provided by Cortex XDR.

D.

BTP uses machine Learning to recognize malicious activity even if it is not known.

Question 15

What is the maximum number of agents one Broker VM local agent applet can support?

Options:

A.

5,000

B.

10,000

C.

15,000

D.

20,000

Question 16

Cortex XDR Analytics can alert when detecting activity matching the following MITRE ATT&CKTM techniques.

Options:

A.

Exfiltration, Command and Control, Collection

B.

Exfiltration, Command and Control, Privilege Escalation

C.

Exfiltration, Command and Control, Impact

D.

Exfiltration, Command and Control, Lateral Movement

Question 17

What is the outcome of creating and implementing an alert exclusion?

Options:

A.

The Cortex XDR agent will allow the process that was blocked to run on the endpoint.

B.

The Cortex XDR console will hide those alerts.

C.

The Cortex XDR agent will not create an alert for this event in the future.

D.

The Cortex XDR console will delete those alerts and block ingestion of them in the future.

Question 18

What license would be required for ingesting external logs from various vendors?

Options:

A.

Cortex XDR Pro per Endpoint

B.

Cortex XDR Vendor Agnostic Pro

C.

Cortex XDR Pro per TB

D.

Cortex XDR Cloud per Host

Question 19

What is an example of an attack vector for ransomware?

Options:

A.

Performing DNS queries for suspicious domains

B.

Performing SSL Decryption on an endpoint

C.

Phishing emails containing malicious attachments

D.

A URL filtering feature enabled on a firewall

Question 20

When creating a BIOC rule, which XQL query can be used?

Options:

A.

dataset = xdr_data

| filter event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

B.

dataset = xdr_data

| filter event_type = PROCESS and

event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

C.

dataset = xdr_data

| filter action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

| fields action_process_image

D.

dataset = xdr_data

| filter event_behavior = true

event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

Question 21

Which of the following is an example of a successful exploit?

Options:

A.

connecting unknown media to an endpoint that copied malware due to Autorun.

B.

a user executing code which takes advantage of a vulnerability on a local service.

C.

identifying vulnerable services on a server.

D.

executing a process executable for well-known and signed software.

Question 22

Network attacks follow predictable patterns. If you interfere with any portion of this pattern, the attack will be neutralized. Which of the following statements is correct?

Options:

A.

Cortex XDR Analytics allows to interfere with the pattern as soon as it is observed on the firewall.

B.

Cortex XDR Analytics does not interfere with the pattern as soon as it is observed on the endpoint.

C.

Cortex XDR Analytics does not have to interfere with the pattern as soon as it is observed on the endpoint in order to prevent the attack.

D.

Cortex XDR Analytics allows to interfere with the pattern as soon as it is observed on the endpoint.

Question 23

What types of actions you can execute with live terminal session?

Options:

A.

Manage Network configurations, Quarantine Files, Run PowerShell scripts

B.

Manage Processes, Manage Files, Run Operating System Commands, Run Ruby Commands and Scripts

C.

Apply patches, Reboot System, send notification for end user, Run Python Commands and Scripts

D.

Manage Processes, Manage Files, Run Operating System Commands, Run Python Commands and Scripts

Question 24

Which statement is true for Application Exploits and Kernel Exploits?

Options:

A.

The ultimate goal of any exploit is to reach the application.

B.

Kernel exploits are easier to prevent then application exploits.

C.

The ultimate goal of any exploit is to reach the kernel.

D.

Application exploits leverage kernel vulnerability.

Question 25

When selecting multiple Incidents at a time, what options are available from the menu when a user right-clicks the incidents? (Choose two.)

Options:

A.

Assign incidents to an analyst in bulk.

B.

Change the status of multiple incidents.

C.

Investigate several Incidents at once.

D.

Delete the selected Incidents.

Question 26

What is the purpose of targeting software vendors in a supply-chain attack?

Options:

A.

to take advantage of a trusted software delivery method.

B.

to steal users’ login credentials.

C.

to access source code.

D.

to report Zero-day vulnerabilities.

Question 27

When creating a scheduled report which is not an option?

Options:

A.

Run weekly on a certain day and time.

B.

Run quarterly on a certain day and time.

C.

Run monthly on a certain day and time.

D.

Run daily at a certain time (selectable hours and minutes).

Page: 1 / 9
Total 91 questions