Weekend Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Paloalto Networks XSIAM-Engineer Palo Alto Networks XSIAM Engineer Exam Practice Test

Page: 1 / 6
Total 59 questions

Palo Alto Networks XSIAM Engineer Questions and Answers

Question 1

A CISO has asked an engineer to create a custom dashboard in Cortex XSIAM that can be filtered to show incidents assigned to a specific user.

Which feature should be used to filter the incident data in the dashboard?

Options:

A.

Filters and inputs in the custom dashboard

B.

Report template to set the incident user filter

C.

Visualization filter options in the widget configuration

D.

Incident summary view to filter by user

Question 2

A file for a support exception that needs to be updated locally on a Linux endpoint has been supplied.

Which cytool command will upload this support exception file to the endpoint?

Options:

A.

cytool upload suexfile -target

B.

cytool upload suex -file

C.

cytool import suex -path

D.

cytool import suexfile -path

Question 3

When Cortex XDR agents are on servers in a zone with no internet access, which configuration will keep them communicating with the platform?

Options:

A.

Logging service in the isolated zone

B.

Broker VM

C.

Integration using filebeat

D.

Engine

Question 4

When activating the Cortex XSIAM tenant, how is the data at rest configured with AES 128 encryption?

Options:

A.

Under Advanced -> Encryption Method, choose the desired encryption method during the initial setup of the tenant.

B.

Under Advanced, choose "BYOK," and adhere to the wizard's instructions as outlined in the encryption method section.

C.

Create encryption keys with AES 128 and upload it securely through Cortex Gateway.

D.

Under Advanced -> Encryption Method, choose the desired encryption method after the initial setup of the tenant.

Question 5

Which action will prevent the automatic extraction of indicators such as IP addresses and URLs from a script's output?

Options:

A.

Add 'ExtractIndicators': False to the script.

B.

Add 'IgnoreAutoExtract': True to the script.

C.

Use 'AutoExtract': False in the script.

D.

Set 'IndicatorExtraction': None in the script.

Question 6

How will Cortex XSIAM help with raw log ingestion from third-party sources in an existing infrastructure?

Options:

A.

Any structured logs coming into it are left completely unchanged, and only metadata is added to the raw data.

B.

For structured logs, like CEF, LEEF, and JSON, it decouples the key-value pairs and saves them in table format.

C.

Any unstructured logs coming into it are left completely unchanged, and metadata is not added to the raw data.

D.

For unstructured logs, it decouples the key-value pairs and saves them in a table format.

Question 7

Which cytool command will look up the policy being applied to a Cortex XDR agent?

Options:

A.

cytool adaptive_policy interval 0

B.

cytool payload_execution query

C.

cytool adaptive_policy recalc

D.

cytool persist print agent_settings.db

Question 8

A Behavioral Threat Protection (BTP) alert is triggered with an action of "Prevented (Blocked)" on one of several application servers running Windows Server 2022. The investigation determines the involved processes to be legitimate core OS binaries, and the description from the triggered BTP rule is an acceptable risk for the company to allow the same activity in the future.

This type of activity is only expected on the endpoints that are members of the endpoint group "AppServers," which already has a separate prevention policy rule with an exceptions profile named "Exceptions-AppServers" and a malware profile named "Malware-AppServers."

The CGO that was terminated has the following properties:

SHA256: eb71ea69dd19f728ab9240565e8c7efb59821e19e3788e289301e1e74940c208

File path: C:\Windows\System32\cmd.exe

Digital Signer: Microsoft Corporation

How should the exception be created so that it is scoped as narrowly as possible to minimize the security gap?

Options:

A.

Create the exception via the alert itself, selecting the CGO hash, CGO signer, CGO process path, and applying the scope to the "Exceptions-AppServers" profile.

B.

Create a Disable Prevention Rule via Exceptions Configuration with the following selections:

Option B8

C.

Create a Legacy Agent Exception via Exceptions Configuration with the following selections:

Option C8

D.

Create the exception via the alert itself, selecting the CGO hash, CGO signer, CGO process path, and applying the scope to "Global."

Question 9

A Cortex XDR agent is installed on an endpoint, but the agent is unable to download content updates and has not registered with the Cortex XSIAM server. An engineer troubleshoots the network connection and determines that, by design, this endpoint does not have direct internet access to the required network destinations for the Cortex XDR agent traffic.

A Broker VM that has the local agent settings applet enabled with Agent Proxy configured is reachable by the endpoint. The Broker VM details are as follows:

FQDN: crtxbroker01.company.net

Proxy listening port: 8888

How should the engineer configure the Cortex XDR agent to use the existing Broker VM as a proxy for the agent network traffic?

Options:

A.

cytool proxy set "crtxbroker01. company.net: 8888"

B.

cytool config proxy --host crtxbroker01.company.net --port 8888

C.

cytool set proxy --host crtxbroker01.company.net --port 8888

D.

cytool proxy config "crtxbroker01.company.net:8888"

Question 10

What is the reason all Broker VM options are greyed out when a user attempts to select a Broker VM as a download source in the Agent Settings profile?

Options:

A.

The Broker VM is offline.

B.

NTP is not synchronized properly on the Broker VM.

C.

Local Agent Setting applet is currently activated without SSL certificate.

D.

Local Agent Setting applet is currently activated without FQDN.

Question 11

Using the integrationContext object, how is data stored and retrieved between integration command runs in Cortex XSIAM?

Options:

A.

The integrationContex object can only store strings, not key-value dictionaries.

B.

The integrationContex object is retrieved and set using the test-module command.

C.

The get_integration_context() method overrides the existing object that is stored.

D.

The integrationContex object supports get_integration_context() and set_integration_context().

Question 12

Based on the _raw_log and XQL query information below, what will be the result(s) of the temp_value?

Question # 12

Options:

A.

123

192.168.10.1

B.

20

C.

10.120.80.2

D.

149.235.219.208

59977

Question 13

In the Incident War Room, which command is used to update incident fields identified in the incident layout?

Options:

A.

!setIncidentFields

B.

!setParentIncidentFields

C.

!setParentIncidentContext

D.

!updateParentIncidentFields

Question 14

During a new Cortex XSIAM deployment, a user consistently experiences timeout sessions while trying to connect to the agent through Live Terminal, even though the firewall engineer has confirmed that all source IP addresses, port 443, and destinations are allowed.

What could be causing these persistent timeout issues?

Options:

A.

User does not have administrative privileges on the managed endpoint.

B.

SSL Decryption is currently being used to inspect the underlying traffic.

C.

NTP is not synchronized with the server time.

D.

Live Terminal feature is not supported on the current OS.

Question 15

Which installer type should be used when upgrading a non-Linux Kubernetes cluster?

Options:

A.

Standalone

B.

Helm

C.

Upgrade from ESM

D.

Kubernetes

Question 16

What should be considered when creating a custom incident domain?

Options:

A.

Alert grouping will not apply, but SmartScore will.

B.

Alert grouping will apply, but SmartScore will not.

C.

Alert grouping and SmartScore will not be applied to incidents.

D.

Alert grouping and SmartScore will be applied to incidents.

Question 17

Administrators from Building 3 have been added to Cortex XSIAM to perform limited functions on a subset of endpoints. Custom roles have been created and applied to the administrators to limit their permissions, but their access should also be constrained through the principle of least privilege according to the endpoints they are allowed to manage. All endpoints are part of an endpoint group named "Building3," and some endpoints may also be members of other endpoint groups.

Which technical control will restrict the ability of the administrators to manage endpoints outside of their area of responsibility, while maintaining visibility to Building 3's endpoints?

Options:

A.

SBAC enabled in Building 3's IP range with the "EG:Building3" tag assigned to each administrator's scope

B.

SBAC enabled in Permissive Mode with the "EG:Building3" tag assigned to each administrator's scope

C.

SBAC enabled in Restrictive Mode with the "EG:Building3" tag assigned to each administrator's scope

D.

SBAC enabled globally with the "EG:Building3" tag assigned to each administrator's scope

Page: 1 / 6
Total 59 questions