Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the Paloalto Networks PSE-Cortex Professional PSE-Cortex Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam PSE-Cortex Premium Access

View all detail and faqs for the PSE-Cortex exam


805 Students Passed

85% Average Score

97% Same Questions
Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which Cortex XDR capability extends investigations to an endpoint?

Options:

A.

Log Stitching

B.

Causality Chain

C.

Sensors

D.

Live Terminal

Questions # 22:

Which command-line interface (CLI) query would retrieve the last three Splunk events?

Options:

A.

!search using=splunk_instance_1 query="* | last 3"

B.

!search using=splunk_instance_1 query="* | 3"

C.

!query using=splunk_instance_1 query="* | last 3"

D.

!search using=splunk_instance_1 query="* | head 3"

Questions # 23:

What are two ways a customer can configure user authentication access Cortex Xpanse? (Choose two.)

Options:

A.

Secure Shell (SSH)

B.

SAML

C.

RADIUS

D.

Customer Support Portal

Questions # 24:

What is a benefit offered by Cortex XSOAR?

Options:

A.

It provides advanced customization capabilities.

B.

It provides real-time protection across hosts and containers.

C.

It enables consolidation of multiple point products into a single integrated service.

D.

It enables a comprehensive view of the customer environment with regard to digital employee productivity.

Questions # 25:

Which two actions are required to add indicators to the whitelist? (Choose two.)

Options:

A.

Click "New Whitelisted Indicator" in the Whitelist page.

B.

Upload an external file named "whitelist" to the Whitelist page.

C.

Upload an external file named "whitelist" to the Indicators page.

D.

Select the indicators and click "Delete and Whitelist" in the Indicators page.

Questions # 26:

What method does the Traps agent use to identify malware during a scheduled scan?

Options:

A.

Heuristic analysis

B.

Local analysis

C.

Signature comparison

D.

WildFire hash comparison and dynamic analysis

Questions # 27:

Which command is used to add Cortex XSOAR "User1" to an investigation from the War Room command-line interface (CLI)?

Options:

A.

/invite User1

B.

#User1

C.

@User1

D.

!invite User1

Questions # 28:

Which statement applies to the malware protection flow in Cortex XDR Prevent?

Options:

A.

Local static analysis happens before a WildFire verdict check.

B.

In the final step, the block list is verified.

C.

A trusted signed file is exempt from local static analysis.

D.

Hash comparisons come after local static analysis.

Questions # 29:

"Bob" is a Demisto user. Which command is used to add 'Bob" to an investigation from the War Room CLI?

Options:

A.

#Bob

B.

/invite Bob

C.

@Bob

D.

!invite Bob

Questions # 30:

How many use cases should a POC success criteria document include?

Options:

A.

only 1

B.

3 or more

C.

no more than 5

D.

no more than 2

Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.