Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Paloalto Networks Security Operations XSIAM-Analyst Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam XSIAM-Analyst Premium Access

View all detail and faqs for the XSIAM-Analyst exam


440 Students Passed

90% Average Score

94% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

A SOC team member implements an incident starring configuration, but incidents created before this configuration were not starred.

What is the cause of this behavior?

Options:

A.

The analyst must manually star incidents after determining which alerts within the incident were automatically starred

B.

It takes 48 hours for the configuration to take effect

C.

Starring is applied to alerts after they have been merged into incidents, but incidents are not starred

D.

Starring configuration is applied to the newly created alerts, and the incident is subsequently starred

Questions # 2:

A Cortex XSIAM analyst is reading a blog that references an unfamiliar critical zero-day vulnerability. This vulnerability has been weaponized, and there is evidence that it is being exploited by threat actors targeting a customer's industry. Where can the analyst go within Cortex XSIAM to learn more about this vulnerability and any potential impacts on the customer environment?

Options:

A.

Threat Intel Management -> Sample Analysis

B.

Threat Intel Management -> Indicators

C.

Attack Surface -> Threat Response Center

D.

Attack Surface -> Attack Surface Rules

Questions # 3:

Which query will hunt for only incoming traffic from 99.99.99.99 when all log sources have been mapped to XDM?

Options:

A.

datamodel preset = * | filter XDM.ALIAS.ip = "99.99.99.99"

B.

datamodel dataset = * filter XDM.ALIAS.ipv4 = "99.99.99.99"

C.

datamodel dataset = * | fields fieldset.xdm_network | filter xdm.source.ipv4 = "99.99.99.99"

D.

preset = network_story | filter agent_ip_addresses = "99.99.99.99"

Questions # 4:

While investigating an incident on the Incident Overview page, an analyst notices that the playbook encountered an error. Upon playbook work plan review, it is determined that the error was caused by a timeout. However, the analyst does not have the necessary permissions to fix or create a new playbook.

Given the critical nature of the incident, what can the analyst do to ensure the playbook continues executing the remaining steps?

Options:

A.

Clone the playbook, remove the faulty step and run the new playbook to bypass the error

B.

Contact TAC to resolve the task error, as the playbook cannot proceed without it

C.

Navigate to the step where the error occurred and run the task again

D.

Pause the step with the error, thus automatically triggering the execution of the remaining steps.

Questions # 5:

An incident in Cortex XSIAM contains the following series of alerts:

    10:24:17 AM - Informational Severity - XDR Analytics BIOC - Rare process execution in organization

    10:24:18 AM - Low Severity - XDR BIOC - Suspicious AMSI DLL load location

    10:24:20 AM - Medium Severity - XDR Agent - WildFire Malware

    11:57:04 AM - High Severity - Correlation - Suspicious admin account creation

Which alert was responsible for the creation of the incident?

Options:

A.

Suspicious AMSI DLL load location

B.

Rare process execution in organization

C.

Suspicious admin account creation

D.

WildFire Malware

Questions # 6:

SCENARIO:

A security analyst has been assigned a ticket from the help desk stating that users are experiencing errors when attempting to open files on a specific network share. These errors state that the file format cannot be opened. IT has verified that the file server is online and functioning, but that all files have unusual extensions attached to them.

The security analyst reviews alerts within Cortex XSIAM and identifies malicious activity related to a possible ransomware attack on the file server. This incident is then escalated to the incident response team for further investigation.

Upon reviewing the incident, the responders confirm that ransomware was successfully executed on the file server. Other details of the attack are noted below:

• An unpatched vulnerability on an externally facing web server was exploited for initial access

• The attackers successfully used Mimikatz to dump sensitive credentials that were used for privilege escalation

• PowerShell was used on a Windows server for additional discovery, as well as lateral movement to other systems

• The attackers executed SystemBC RAT on multiple systems to maintain remote access

• Ransomware payload was downloaded on the file server via an external site "file io"

QUESTION STATEMENT:

Which forensics artifact collected by Cortex XSIAM will help the responders identify what the attackers were looking for during the discovery phase of the attack?

Options:

A.

PSReadline

B.

WordWheelQuery

C.

User access logging

D.

Shell history

Questions # 7:

Which Cytool command will re-enable protection on an endpoint that has Cortex XDR agent protection paused?

Options:

A.

cytool security enable

B.

cytool runtime start

C.

cytool service start

D.

cytool protect enable

Questions # 8:

Which feature terminates a process during an investigation?

Options:

A.

Response Center

B.

Live Terminal

C.

Exclusion

D.

Restriction

Questions # 9:

How can a SOC analyst highlight alerts generated on C-level executive hosts?

Options:

A.

Add the C-level executive users to the Executive Accounts asset role.

B.

Add a tag to the C-level executive users

C.

Create a Featured Alert field for the C-level hosts

D.

Create a dynamic group for the C-level hosts.

Questions # 10:

What is the cause when alerts generated by a correlation rule are not creating an incident?

Options:

A.

The rule is configured with alert severity below Medium.

B.

The rule does not have a drill-down query configured

C.

The rule has alert suppression enabled

D.

The rule is using the preconfigured Cortex XSIAM alert field mapping.

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.