Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Paloalto Networks Security Operations XDR-Engineer Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam XDR-Engineer Premium Access

View all detail and faqs for the XDR-Engineer exam


429 Students Passed

87% Average Score

93% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

An analyst considers an alert with the category of lateral movement to be allowed and not needing to be checked in the future. Based on the image below, which action can an engineer take to address the requirement?

Question # 1

Options:

A.

Create a behavioral indicator of compromise (BIOC) suppression rule for the parent process and the specific BIOC: Lateral movement

B.

Create an alert exclusion rule by using the alert source and alert name

C.

Create a disable injection and prevention rule for the parent process indicated in the alert

D.

Create an exception rule for the parent process and the exact command indicated in the alert

Questions # 2:

Based on the image of a validated false positive alert below, which action is recommended for resolution?

Question # 2

Options:

A.

Create an alert exclusion for OUTLOOK.EXE

B.

Disable an action to the CGO Process DWWIN.EXE

C.

Create an exception for the CGO DWWIN.EXE for ROP Mitigation Module

D.

Create an exception for OUTLOOK.EXE for ROP Mitigation Module

Questions # 3:

During deployment of Cortex XDR for Linux Agents, the security engineering team is asked to implement memory monitoring for agent health monitoring. Which agent service should be monitored to fulfill this request?

Options:

A.

dypdng

B.

clad

C.

pyxd

D.

pmd

Questions # 4:

A correlation rule is created to detect potential insider threats by correlating user login events from one dataset with file access events from another dataset. The rule must retain all user login events, even if there are no matching file access events, to ensure no login activity is missed.

text

Copy

dataset = x

| join (dataset = y)

Which type of join is required to maintain all records from dataset x, even if there are no matching events from dataset y?

Options:

A.

Inner

B.

Left

C.

Right

D.

Outer

Questions # 5:

What is the earliest time frame an alert could be automatically generated once the conditions of a new correlation rule are met?

Options:

A.

Between 30 and 45 minutes

B.

Immediately

C.

5 minutes or less

D.

Between 10 and 20 minutes

Questions # 6:

Some company employees are able to print documents when working from home, but not on network-attached printers, while others are able to print only to file. What can be inferred about the affected users’ inability to print?

Options:

A.

They may be attached to the default extensions policy and profile

B.

They may have a host firewall profile set to block activity to all network-attached printers

C.

They may have different disk encryption profiles that are not allowing print jobs on encrypted files

D.

They may be on different device extensions profiles set to block different print jobs

Questions # 7:

A static endpoint group is created by adding 321 endpoints using the Upload From File feature. However, after group creation, the members count field shows 244 endpoints. What are two possible reasons why endpoints were not added to the group? (Choose two.)

Options:

A.

Static groups have a limit of 250 endpoints when adding by file

B.

Endpoints added to the new group were previously added to an existing group

C.

Endpoints added to the group were in Disconnected or Connection Lost status when groupmembership was added

D.

The IP address, hostname, or alias of the endpoints must match an existing agent that has registered with the tenant

Questions # 8:

Which method will drop undesired logs and reduce the amount of data being ingested?

Options:

A.

[COLLECT:vendor="vendor", product="product", target_brokers="", no_hit=drop] * drop _raw_log contains "undesired logs";

B.

[INGEST:vendor="vendor", product="product", target_dataset="vendor_product_raw",no_hit=drop] * filter _raw_log not contains "undesired logs";

C.

[COLLECT:vendor="vendor", product="product", target_dataset="", no_hit=drop] * drop _raw_log contains "undesired logs";

D.

[INGEST:vendor="vendor", product="product", target_brokers="vendor_product_raw", no_hit=keep] * filter _raw_log not contains "undesired logs";

Questions # 9:

Using the Cortex XDR console, how can additional network access be allowed from a set of IP addresses to an isolated endpoint?

Options:

A.

Add entries in Configuration section of Security Settings

B.

Add entries in the Allowed Domains section of Security Settings for the tenant

C.

Add entries in Exceptions Configuration section of Isolation Exceptions

D.

Add entries in Response Actions section of Agent Settings profile

Questions # 10:

How can a Malware profile be configured to prevent a specific executable from being uploaded to the cloud?

Options:

A.

Disable on-demand file examination for the executable

B.

Set PE and DLL examination for the executable to report action mode

C.

Add the executable to the allow list for executions

D.

Create an exclusion rule for the executable

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.