Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Paloalto Networks Security Operations XSIAM-Engineer Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam XSIAM-Engineer Premium Access

View all detail and faqs for the XSIAM-Engineer exam


528 Students Passed

93% Average Score

92% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Based on the _raw_log and XQL query information below, what will be the result(s) of the temp_value?

Question # 1

Options:

A.

123

192.168.10.1

B.

20

C.

10.120.80.2

D.

149.235.219.208

59977

Questions # 2:

Which common issue can result in sudden data ingestion loss for a data source that was previously successful?

Options:

A.

Data source is using an unsupported data format.

B.

Data source has reached its maximum storage capacity.

C.

Data source has reached its end of life for support.

D.

API key used for the integration has expired.

Questions # 3:

Administrators from Building 3 have been added to Cortex XSIAM to perform limited functions on a subset of endpoints. Custom roles have been created and applied to the administrators to limit their permissions, but their access should also be constrained through the principle of least privilege according to the endpoints they are allowed to manage. All endpoints are part of an endpoint group named "Building3," and some endpoints may also be members of other endpoint groups.

Which technical control will restrict the ability of the administrators to manage endpoints outside of their area of responsibility, while maintaining visibility to Building 3's endpoints?

Options:

A.

SBAC enabled in Building 3's IP range with the "EG:Building3" tag assigned to each administrator's scope

B.

SBAC enabled in Permissive Mode with the "EG:Building3" tag assigned to each administrator's scope

C.

SBAC enabled in Restrictive Mode with the "EG:Building3" tag assigned to each administrator's scope

D.

SBAC enabled globally with the "EG:Building3" tag assigned to each administrator's scope

Questions # 4:

An application which ingests custom application logs is hosted in an on-premises virtual environment on an Ubuntu server, and it logs locally to a .csv file.

Which set of actions will allow the ingestion of the .csv logs into Cortex XSIAM directly from the server?

An application which ingests custom application logs is hosted in an on-premises virtual environment on an Ubuntu server, and it logs locally to a .csv file.

Which set of actions will allow the ingestion of the .csv logs into Cortex XSIAM directly from the server?

Options:

A.

Install a Broker VM in the environment, and configure the CSV Collector to collect the files of interest.

B.

Install a Cortex XDR agent on the Ubuntu server, and configure the agent to collect the files of interest.

C.

Install a Broker VM in the environment, and migrate the application to the Broker VM.

D.

Install XDR Collector on the Ubuntu server, and configure the agent to collect the files of interest.

Questions # 5:

In the Incident War Room, which command is used to update incident fields identified in the incident layout?

Options:

A.

!setIncidentFields

B.

!setParentIncidentFields

C.

!setParentIncidentContext

D.

!updateParentIncidentFields

Questions # 6:

Which cytool command will look up the policy being applied to a Cortex XDR agent?

Options:

A.

cytool adaptive_policy interval 0

B.

cytool payload_execution query

C.

cytool adaptive_policy recalc

D.

cytool persist print agent_settings.db

Questions # 7:

Which action will prevent the automatic extraction of indicators such as IP addresses and URLs from a script's output?

Options:

A.

Add 'ExtractIndicators': False to the script.

B.

Add 'IgnoreAutoExtract': True to the script.

C.

Use 'AutoExtract': False in the script.

D.

Set 'IndicatorExtraction': None in the script.

Questions # 8:

A Cortex XSIAM engineer at a SOC downgrades a critical threat intelligence content pack from the Cortex Marketplace while performing routine maintenance. As a result, the SOC team loses access to the latest threat intelligence data.

Which action will restore the functionality of the content pack to its previously installed version?

Options:

A.

Contact Palo Alto Networks Support to create an exception to revert to the previously installed version.

B.

Back up the current configuration and data, then revert to the previously installed version.

C.

Remove all integrations and playbooks associated with the content pack, then revert to the previously installed version.

D.

Directly reinstall the previously installed version over the current one.

Questions # 9:

What is the function of the "MODEL" section when creating a data model rule?

Options:

A.

To make a list of all the relevant fields to be mapped from the logs to XDM

B.

To define the mapping between a single dataset and XDM

C.

To finalize rule definition with all XQL statements

D.

To map log fields to corresponding Cortex XSIAM Data Model (XDM) fields

Questions # 10:

Which section of a parsing rule defines the newly created dataset?

Options:

A.

RULE

B.

COLLECT

C.

INGEST

D.

CONST

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.