Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Paloalto Networks PSE-Cortex Professional PSE-Cortex-Pro-24 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam PSE-Cortex-Pro-24 Premium Access

View all detail and faqs for the PSE-Cortex-Pro-24 exam


485 Students Passed

92% Average Score

96% Same Questions
Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
Questions # 1:

What are the key capabilities of the ASM for Remote Workers module?

Options:

A.

Monitoring endpoint activity, managing firewall rules, and mitigating cybersecurity threats

B.

Gathering endpoint data, conducting internal scans, and automating network configurations

C.

Identifying office network vulnerabilities, monitoring remote workforce, and encrypting data

D.

Analyzing global scan data, identifying risky issues on remote networks, and providing internal insights

Questions # 2:

A customer has purchased Cortex XSOAR and has a need to rapidly stand up the product in their environment. The customer has stated that their internal staff are currently occupied with other projects.

Which Palo Alto Networks service offering should be recommended to the customer?

Options:

A.

Deployment

B.

Onboardinq

C.

Fast-Track

D.

QuickStart

Questions # 3:

An Administrator is alerted to a Suspicious Process Creation security event from multiple users.

The users believe that these events are false positives Which two steps should the administrator take to confirm the false positives and create an exception? (Choose two )

Options:

A.

With the Malware Security profile, disable the "Prevent Malicious Child Process Execution" module

B.

Within the Malware Security profile add the specific parent process, child process, and command line argument to the child process whitelist

C.

In the Cortex XDR security event, review the specific parent process, child process, and command line arguments

D.

Contact support and ask for a security exception.

Questions # 4:

What is the primary purpose of Cortex XSIAM’s machine learning led design?

Options:

A.

To group alerts into incidents for manual analysis

B.

To facilitate alert and log management without automation

C.

To effectively handle the bulk of incidents through automation

D.

To rely heavily on human-driven detection and remediation

Questions # 5:

What should be configured for a Cortex XSIAM customer who wants to automate the response to certain alerts?

Options:

A.

Playbook triggers

B.

Correlation rules

C.

Incident scoring

D.

Data model rules

Questions # 6:

On a multi-tenanted v6.2 Cortex XSOAR server, which path leads to the server.log for "Tenant1"?

Options:

A.

/var/log/demisto/acc_Tenant1/server.log

B.

/var/log/demisto/Tenant1/server.log

C.

/var/lib/demisto/acc_Tenant1/server.log

D.

/var/lib/demisto/server.log

Questions # 7:

In an Air-Gapped environment where the Docker package was manually installed after the Cortex XSOAR installation which action allows Cortex XSOAR to access Docker?

Options:

A.

create a “docker” group and add the "Cortex XSOAR" or "demisto" user to this group

B.

create a "Cortex XSOAR' or "demisto" group and add the "docker" user to this group

C.

disable the Cortex XSOAR service

D.

enable the docker service

Questions # 8:

Which Cortex XDR capability extends investigations to an endpoint?

Options:

A.

Log Stitching

B.

Causality Chain

C.

Sensors

D.

Live Terminal

Questions # 9:

An administrator has a critical group of systems running Windows XP SP3 that cannot be upgraded The administrator wants to evaluate the ability of Traps to protect these systems and the word processing applications running on them

How should an administrator perform this evaluation?

Options:

A.

Gather information about the word processing applications and run them on a Windows XP SP3 VM Determine if any of the applications are vulnerable and run the exploit with an exploitation tool

B.

Run word processing exploits in a latest version of Windows VM in a controlled and isolated environment. Document indicators of compromise and compare to Traps protection capabilities

C.

Run a known 2015 flash exploit on a Windows XP SP3 VM. and run an exploitation tool that acts as a listener Use the results to demonstrate Traps capabilities

D.

Prepare the latest version of Windows VM Gather information about the word processing applications, determine if some of them are vulnerable and prepare a working exploit for at least one of them Execute with an exploitation tool

Questions # 10:

What is the result of creating an exception from an exploit security event?

Options:

A.

White lists the process from Wild Fire analysis

B.

exempts the user from generating events for 24 hours

C.

exempts administrators from generating alerts for 24 hours

D.

disables the triggered EPM for the host and process involve

Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.