special code - Ends in 0d 00h 00m 00s - Coupon code = discmirror

Pass the Paloalto Networks Security Operations XDR-Analyst Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam XDR-Analyst Premium Access

View all detail and faqs for the XDR-Analyst exam


561 Students Passed

89% Average Score

95% Same Questions
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which search methods is supported by File Search and Destroy?

Options:

A.

File Seek and Destroy

B.

File Search and Destroy

C.

File Seek and Repair

D.

File Search and Repair

Questions # 2:

When viewing the incident directly, what is the “assigned to” field value of a new Incident that was just reported to Cortex?

Options:

A.

Pending

B.

It is blank

C.

Unassigned

D.

New

Questions # 3:

In incident-related widgets, how would you filter the display to only show incidents that were “starred”?

Options:

A.

Create a custom XQL widget

B.

This is not currently supported

C.

Create a custom report and filter on starred incidents

D.

Click the star in the widget

Questions # 4:

If you have an isolated network that is prevented from connecting to the Cortex Data Lake, which type of Broker VM setup can you use to facilitate the communication?

Options:

A.

Broker VM Pathfinder

B.

Local Agent Proxy

C.

Local Agent Installer and Content Caching

D.

Broker VM Syslog Collector

Questions # 5:

What are two purposes of “Respond to Malicious Causality Chains” in a Cortex XDR Windows Malware profile? (Choose two.)

Options:

A.

Automatically close the connections involved in malicious traffic.

B.

Automatically kill the processes involved in malicious activity.

C.

Automatically terminate the threads involved in malicious activity.

D.

Automatically block the IP addresses involved in malicious traffic.

Questions # 6:

Which type of IOC can you define in Cortex XDR?

Options:

A.

Destination IP Address

B.

Source IP Address

C.

Source port

D.

Destination IP Address: Destination

Questions # 7:

What is the purpose of targeting software vendors in a supply-chain attack?

Options:

A.

to take advantage of a trusted software delivery method.

B.

to steal users’ login credentials.

C.

to access source code.

D.

to report Zero-day vulnerabilities.

Questions # 8:

What contains a logical schema in an XQL query?

Options:

A.

Bin

B.

Array expand

C.

Field

D.

Dataset

Questions # 9:

What kind of the threat typically encrypts user files?

Options:

A.

ransomware

B.

SQL injection attacks

C.

Zero-day exploits

D.

supply-chain attacks

Questions # 10:

What should you do to automatically convert leads into alerts after investigating a lead?

Options:

A.

Lead threats can't be prevented in the future because they already exist in the environment.

B.

Create IOC rules based on the set of the collected attribute-value pairs over the affected entities concluded during the lead hunting.

C.

Create BIOC rules based on the set of the collected attribute-value pairs over the affected entities concluded during the lead hunting.

D.

Build a search query using Query Builder or XQL using a list of lOCs.

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.