Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Paloalto Networks XSIAM-Analyst Palo Alto Networks XSIAM Analyst Exam Practice Test

Page: 1 / 5
Total 50 questions

Palo Alto Networks XSIAM Analyst Questions and Answers

Question 1

Which Cytool command will re-enable protection on an endpoint that has Cortex XDR agent protection paused?

Options:

A.

cytool security enable

B.

cytool runtime start

C.

cytool service start

D.

cytool protect enable

Question 2

Which feature terminates a process during an investigation?

Options:

A.

Response Center

B.

Live Terminal

C.

Exclusion

D.

Restriction

Question 3

Which two methods can be used to create and share queries into the Query Library? (Choose two.)

Options:

A.

From the Query Center, locate the query to save to a personal Query Library. Right-click, and select "Save query to library". Enable the "Share with others" option

B.

From XQL Search, locate the query to save to a personal Query Library. Right-click, and select "Save query to library". Enable the "Share with others" option

C.

From XQL Search, in the XQL query field, define the parameters of the query. Save as, and choose the "Query to Library" option. Enable the "Share with others" option

D.

From the Query Center, in the XQL query field, define the parameters of the query. Save as, and choose the "Query to Library" option. Enable the "Share with others" option

Question 4

What is the expected behavior when querying a data model with no specific fields specified in the query?

Options:

A.

The query will error out and not run.

B.

The default dataset=xdr_data fields will be returned.

C.

No fields will be returned by default.

D.

The xdm_core fieldset will be returned by default.

Question 5

Which type of task can be used to create a decision tree in a playbook?

Options:

A.

Sub-playbook

B.

Standard

C.

Job

D.

Conditional

Question 6

A threat hunter discovers a true negative event from a zero-day exploit that is using privilege escalation to launch "Malware pdf.exe". Which XQL query will always show the correct user context used to launch "Malware pdf.exe"?

Options:

A.

config case_sensitive = false | dataset = xdr_data | filter event_type = ENUM.PROCESS | filter action_process_image_name = "Malware.pdf.exe" | fields causality_actor_effective_username

B.

config case_sensitive = false | dataset = xdr_data | filter event_type = ENUM.PROCESS | filter action_process_image_name = "Malware.pdf.exe" | fields actor_process_username

C.

config case_sensitive = false | datamodel dataset = xdrdata | filter xdm.source.process.name = "Malware.pdf.exe" | fields xdm.target.user.username

D.

config case_sensitive = false | dataset = xdr_data | filter event_type = ENUM.PROCESS | filter action_process_image_name = "Malware.pdf.exe" | fields action_process_username

Question 7

In the Endpoint Data context menu of the Cortex XSIAM endpoints table, where will an analyst be able to determine which users accessed an endpoint via Live Terminal?

Options:

A.

View Endpoint Policy

B.

View Endpoint Logs

C.

View Incidents

D.

View Actions

Question 8

While investigating an incident on the Incident Overview page, an analyst notices that the playbook encountered an error. Upon playbook work plan review, it is determined that the error was caused by a timeout. However, the analyst does not have the necessary permissions to fix or create a new playbook.

Given the critical nature of the incident, what can the analyst do to ensure the playbook continues executing the remaining steps?

Options:

A.

Clone the playbook, remove the faulty step and run the new playbook to bypass the error

B.

Contact TAC to resolve the task error, as the playbook cannot proceed without it

C.

Navigate to the step where the error occurred and run the task again

D.

Pause the step with the error, thus automatically triggering the execution of the remaining steps.

Question 9

What information is provided in the timeline view of Cortex XSIAM?

Options:

A.

Detailed overview of behavior or activity that triggered an Analytics Alert, Analytics BIOC alert or correlation rule

B.

Graphic representation of an event Causality Instance (CI) with additional capabilities to enable further analysis

C.

Tab within an incident where analysts can collaborate and initiate further actions and automations

D.

Sequence of events, alerts, rules and other actions involved over the lifespan of an incident

Question 10

Based on the artifact details in the image below, what can an analyst infer from the hexagon-shaped object with the exclamation mark (!) at the center?

Question # 10

Options:

A.

The WildFire verdict returned is "Low Confidence."

B.

The artifact verdict has changed from a previous state to "Malware."

C.

The malicious artifact was injected.

D.

The malware requires further analysis.

Question 11

Two security analysts are collaborating on complex but similar incidents. The first analyst merges the two incidents into one for easier management. The other analyst immediately discovers that the custom incident field values relevant to the investigation are missing.

How can the team retrieve the missing details?

Options:

A.

Examine the incident context of the source incident

B.

Unmerge the incidents to capture the missing details.

C.

Check the timeline view of the incident

D.

Check the War Room of the destination incident

Question 12

An analyst conducting a threat hunt needs to collect multiple files from various endpoints. The analyst begins the file retrieval process by using the Action Center, but upon review of the retrieved files, notices that the list is incomplete and missing files, including kernel files.

What could be the reason for the issue?

Options:

A.

The file retrieval policy applied to the endpoints may restrict access to certain system or kernel files

B.

The retrieval process is limited to 500 MB in total file size

C.

The endpoint agents were in offline mode during the file retrieval process, causing some files to be skipped

D.

The analyst must manually retrieve kernel files by accessing the machine directly

Question 13

Based on the image below, which two additional steps should a SOC analyst take to secure the endpoint? (Choose two.)

Question # 13

Options:

A.

Live Terminal into the workstation to verify.

B.

Reboot the machine.

C.

Block 192.168.1.199.

D.

Isolate the affected workstation.

Question 14

In addition to defining the Rule Name and Severity Level, which step or set of steps accurately reflects how an analyst should configure an indicator prevention rule before reviewing and saving it?

Options:

A.

Filter and select file, IP address, and domain indicators.

B.

Select profiles for prevention

C.

Filter and select one or more file, IP address, and domain indicators.

D.

Select profiles for prevention

E.

Filter and select one or more SHA256 and MD5 indicators

F.

Filter and select indicators of any type.

Question 15

Which attribution evidence will have the lowest confidence level when evaluating assets to determine if they belong to an organization’s attack surface?

Options:

A.

An asset discovered through registration information attributed to the organization

B.

An asset attributed to the organization because the name server domain contains the company domain

C.

An asset attributed to the organization because the Subject Organization field contains the company name

D.

An asset manually approved by a Cortex Xpanse analyst

Page: 1 / 5
Total 50 questions