Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Paloalto Networks Palo Alto Certifications and Accreditations PCDRA Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam PCDRA Premium Access

View all detail and faqs for the PCDRA exam


366 Students Passed

85% Average Score

95% Same Questions
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Cortex XDR Analytics can alert when detecting activity matching the following MITRE ATT&CKTM techniques.

Options:

A.

Exfiltration, Command and Control, Collection

B.

Exfiltration, Command and Control, Privilege Escalation

C.

Exfiltration, Command and Control, Impact

D.

Exfiltration, Command and Control, Lateral Movement

Questions # 2:

A Linux endpoint with a Cortex XDR Pro per Endpoint license and Enhanced Endpoint Data enabled has reported malicious activity, resulting in the creation of a file that you wish to delete. Which action could you take to delete the file?

Options:

A.

Manually remediate the problem on the endpoint in question.

B.

Open X2go from the Cortex XDR console and delete the file via X2go.

C.

Initiate Remediate Suggestions to automatically delete the file.

D.

Open an NFS connection from the Cortex XDR console and delete the file.

Questions # 3:

What are two purposes of “Respond to Malicious Causality Chains” in a Cortex XDR Windows Malware profile? (Choose two.)

Options:

A.

Automatically close the connections involved in malicious traffic.

B.

Automatically kill the processes involved in malicious activity.

C.

Automatically terminate the threads involved in malicious activity.

D.

Automatically block the IP addresses involved in malicious traffic.

Questions # 4:

Which of the following policy exceptions applies to the following description?

‘An exception allowing specific PHP files’

Options:

A.

Support exception

B.

Local file threat examination exception

C.

Behavioral threat protection rule exception

D.

Process exception

Questions # 5:

To stop a network-based attack, any interference with a portion of the attack pattern is enough to prevent it from succeeding. Which statement is correct regarding the Cortex XDR Analytics module?

Options:

A.

It does not interfere with any portion of the pattern on the endpoint.

B.

It interferes with the pattern as soon as it is observed by the firewall.

C.

It does not need to interfere with the any portion of the pattern to prevent the attack.

D.

It interferes with the pattern as soon as it is observed on the endpoint.

Questions # 6:

Which type of IOC can you define in Cortex XDR?

Options:

A.

Destination IP Address

B.

Source IP Address

C.

Source port

D.

Destination IPAddress: Destination

Questions # 7:

In the deployment of which Broker VM applet are you required to install a strong cipher SHA256-based SSL certificate?

Options:

A.

Agent Proxy

B.

Agent Installer and Content Caching

C.

Syslog Collector

D.

CSV Collector

Questions # 8:

When creating a scheduled report which is not an option?

Options:

A.

Run weekly on a certain day and time.

B.

Run quarterly on a certain day and time.

C.

Run monthly on a certain day and time.

D.

Run daily at a certain time (selectable hours and minutes).

Questions # 9:

Which Type of IOC can you define in Cortex XDR?

Options:

A.

destination port

B.

e-mail address

C.

full path

D.

App-ID

Questions # 10:

Which of the following paths will successfully activate Remediation Suggestions?

Options:

A.

Incident View > Actions > Remediation Suggestions

B.

Causality View > Actions > Remediation Suggestions

C.

Alerts Table > Right-click on a process node > Remediation Suggestions

D.

Alerts Table > Right-click on an alert > Remediation Suggestions

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.