Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Paloalto Networks XDR-Engineer Palo Alto Networks XDR Engineer Exam Practice Test

Page: 1 / 5
Total 50 questions

Palo Alto Networks XDR Engineer Questions and Answers

Question 1

What is a benefit of ingesting and forwarding Palo Alto Networks NGFW logs to Cortex XDR?

Options:

A.

Sending endpoint logs to the NGFW for analysis

B.

Blocking network traffic based on Cortex XDR detections

C.

Enabling additional analysis through enhanced application logging

D.

Automated downloading of malware signatures from the NGFW

Question 2

A multinational company with over 300,000 employees has recently deployed Cortex XDR in North America. The solution includes the Identity Threat Detection and Response (ITDR) add-on, and the Cortex team has onboarded the Cloud Identity Engine to the North American tenant. After waiting the required soak period and deploying enough agents to receive Identity and threat analytics detections, the team does not see user, group, or computer details for individuals from the European offices. What may be the reason for the issue?

Options:

A.

The XDR tenant is not in the same region as the Cloud Identity Engine

B.

The Cloud Identity Engine plug-in has not been installed and configured

C.

The Cloud Identity Engine needs to be activated in all global regions

D.

The ITDR add-on is not compatible with the Cloud Identity Engine

Question 3

Using the Cortex XDR console, how can additional network access be allowed from a set of IP addresses to an isolated endpoint?

Options:

A.

Add entries in Configuration section of Security Settings

B.

Add entries in the Allowed Domains section of Security Settings for the tenant

C.

Add entries in Exceptions Configuration section of Isolation Exceptions

D.

Add entries in Response Actions section of Agent Settings profile

Question 4

A query is created that will run weekly via API. After it is tested and ready, it is reviewed in the Query Center. Which available column should be checked to determine how many compute units will be used when the query is run?

Options:

A.

Query Status

B.

Compute Unit Usage

C.

Simulated Compute Units

D.

Compute Unit Quota

Question 5

Which method will drop undesired logs and reduce the amount of data being ingested?

Options:

A.

[COLLECT:vendor="vendor", product="product", target_brokers="", no_hit=drop] * drop _raw_log contains "undesired logs";

B.

[INGEST:vendor="vendor", product="product", target_dataset="vendor_product_raw",no_hit=drop] * filter _raw_log not contains "undesired logs";

C.

[COLLECT:vendor="vendor", product="product", target_dataset="", no_hit=drop] * drop _raw_log contains "undesired logs";

D.

[INGEST:vendor="vendor", product="product", target_brokers="vendor_product_raw", no_hit=keep] * filter _raw_log not contains "undesired logs";

Question 6

An engineer wants to automate the handling of alerts in Cortex XDR and defines several automation rules with different actions to be triggered based on specific alert conditions. Some alerts do not trigger the automation rules as expected. Which statement explains why the automation rules might not apply to certain alerts?

Options:

A.

They are executed in sequential order, so alerts may not trigger the correct actions if the rules are not configured properly

B.

They only apply to new alerts grouped into incidents by the system and only alerts that generateincidents trigger automation actions

C.

They can only be triggered by alerts with high severity; alerts with low or informational severity will not trigger the automation rules

D.

They can be applied to any alert, but they only work if the alert is manually grouped into an incident by the analyst

Question 7

Which statement describes the functionality of fixed filters and dashboard drilldowns in enhancing a dashboard’s interactivity and data insights?

Options:

A.

Fixed filters allow users to select predefined data values, while dashboard drilldowns enable users to alter the scope of the data displayed by selecting filter values from the dashboard header

B.

Fixed filters limit the data visible in widgets, while dashboard drilldowns allow users to download data from the dashboard in various formats

C.

Fixed filters let users select predefined or dynamic values to adjust the scope, while dashboard drilldowns provide interactive insights or trigger contextual changes, like linking to XQL searches

D.

Fixed filters allow users to adjust the layout, while dashboard drilldowns provide links to external reports and/or dashboards

Question 8

What will enable a custom prevention rule to block specific behavior?

Options:

A.

A correlation rule added to an Agent Blocking profile

B.

A custom behavioral indicator of compromise (BIOC) added to an Exploit profile

C.

A custom behavioral indicator of compromise (BIOC) added to a Restriction profile

D.

A correlation rule added to a Malware profile

Question 9

Multiple remote desktop users complain of in-house applications no longer working. The team uses macOS with Cortex XDR agents version 8.7.0, and the applications were previously allowed by disable prevention rules attached to the Exceptions Profile "Engineer-Mac." Based on the images below, what is a reason for this behavior?

Question # 9

Options:

A.

Endpoint IP address changed from 192.168.0.0 range to 192.168.100.0 range

B.

The Cloud Identity Engine is disconnected or removed

C.

XDR agent version was downgraded from 8.7.0 to 8.4.0

D.

Installation type changed from VDI to Kubernetes

Question 10

In addition to using valid authentication credentials, what is required to enable the setup of the Database Collector applet on the Broker VM to ingest database activity?

Options:

A.

Valid SQL query targeting the desired data

B.

Access to the database audit log

C.

Database schema exported in the correct format

D.

Access to the database transaction log

Question 11

A correlation rule is created to detect potential insider threats by correlating user login events from one dataset with file access events from another dataset. The rule must retain all user login events, even if there are no matching file access events, to ensure no login activity is missed.

text

Copy

dataset = x

| join (dataset = y)

Which type of join is required to maintain all records from dataset x, even if there are no matching events from dataset y?

Options:

A.

Inner

B.

Left

C.

Right

D.

Outer

Question 12

During the deployment of a Broker VM in a high availability (HA) environment, after configuring the Broker VM FQDN, an XDR engineer must ensure agent installer availability and efficient content caching to maintain performance consistency across failovers. Which additionalconfiguration steps should the engineer take?

Options:

A.

Use shared SSL certificates and keys for all Broker VMs and configure a single IP address for failover

B.

Upload the-signed SSL server certificate and key and deploy a load balancer

C.

Deploy a load balancer and configure SSL termination at the load balancer

D.

Enable synchronized session persistence across Broker VMs and use a self-signed certificate and key

Question 13

Based on the image of a validated false positive alert below, which action is recommended for resolution?

Question # 13

Options:

A.

Create an alert exclusion for OUTLOOK.EXE

B.

Disable an action to the CGO Process DWWIN.EXE

C.

Create an exception for the CGO DWWIN.EXE for ROP Mitigation Module

D.

Create an exception for OUTLOOK.EXE for ROP Mitigation Module

Question 14

What is the earliest time frame an alert could be automatically generated once the conditions of a new correlation rule are met?

Options:

A.

Between 30 and 45 minutes

B.

Immediately

C.

5 minutes or less

D.

Between 10 and 20 minutes

Question 15

Which XQL query can be saved as a behavioral indicator of compromise (BIOC) rule, then converted to a custom prevention rule?

Options:

A.

dataset = xdr_data

| filter event_type = ENUM.DEVICE and action_process_image_name = "**"

and action_process_image_command_line = "-e cmd*"

and action_process_image_command_line != "*cmd.exe -a /c*"

B.

dataset = xdr_data

| filter event_type = ENUM.PROCESS and event_type = ENUM.DEVICE and action_process_image_name = "**"

and action_process_image_command_line = "-e cmd*"

and action_process_image_command_line != "*cmd.exe -a /c*"

C.

dataset = xdr_data

| filter event_type = FILE and (event_sub_type = FILE_CREATE_NEW or event_sub_type = FILE_WRITE or event_sub_type = FILE_REMOVE or event_sub_type = FILE_RENAME) and agent_hostname = "hostname"

| filter lowercase(action_file_path) in ("/etc/*", "/usr/local/share/*", "/usr/share/*") and action_file_extension in ("conf", "txt")

| fields action_file_name, action_file_path, action_file_type, agent_ip_a

D.

dataset = xdr_data

| filter event_type = ENUM.PROCESS and action_process_image_name = "**"

and action_process_image_command_line = "-e cmd*"

and action_process_image_command_line != "*cmd.exe -a /c*"

Page: 1 / 5
Total 50 questions