A customer has purchased Cortex XSOAR and has a need to rapidly stand up the product in their environment. The customer has stated that their internal staff are currently occupied with other projects.
Which Palo Alto Networks service offering should be recommended to the customer?
The certificate used for decryption was installed as a trusted toot CA certificate to ensure communication between the Cortex XDR Agent and Cortex XDR Management Console. What action needs to be taken if the administrator determines the Cortex XDR Agents are not communicating with the Cortex XDR Management Console?
A customer has purchased Cortex XDR and requires phone support for the product.
Which Palo Alto Networks offering would fulfill this need?
Which Cortex XSIAM license is required if an organization needs to protect a cloud Kubernetes host?
What is a key difference between audit users and full users in Cortex XSOAR?
Which feature of Cortex XSIAM displays an entire picture of an attack, including the originating process or delivery point?
On a multi-tenanted v6.2 Cortex XSOAR server, which path leads to the server.log for "Tenant1"?
Which two types of indicators of compromise (IOCs) are available for creation in Cortex XDR? (Choose two.)
What is the primary mechanism for the attribution of attack surface data in Cortex Xpanse?
A Cortex XSOAR customer wants to ingest emails from a single mailbox. The mailbox brings in reported phishing emails and email requests from human resources (HR) to onboard new users. The customer wants to run two separate workflows from this mailbox, one for phishing and one for onboarding.
What will allow Cortex XSOAR to accomplish this in the most efficient way?
If a customer activates a TMS tenant and has not purchased a Cortex Data Lake instance.
Palo Alto Networks will provide the customer with a free instance
What size is this free Cortex Data Lake instance?
Rearrange the steps into the correct order for modifying an incident layout.
When preparing the golden image in a Cortex XDR Virtual Desktop Infrastructure (VDI) deployment, which step is required?
Which two troubleshooting steps should be taken when an integration is failing to connect? (Choose two.)
Which Cortex XDR capability prevents running malicious files from USB-connected removable equipment?
Which statement applies to the differentiation of Cortex XDR from security information and event management (SIEM)?
What method does the Traps agent use to identify malware during a scheduled scan?
Which command-line interface (CLI) query would retrieve the last three Splunk events?
Which attack method is a result of techniques designed to gain access through vulnerabilities in the code of an operating system (OS) or application?
Which three Demisto incident type features can be customized under Settings > Advanced > Incident Types? (Choose three.)
In an Air-Gapped environment where the Docker package was manually installed after the Cortex XSOAR installation which action allows Cortex XSOAR to access Docker?
Which two areas of Cortex XDR are used for threat hunting activities? (Choose two.)
Cortex XDR can schedule recurring scans of endpoints for malware. Identify two methods for initiating an on-demand malware scan (Choose two )
Why is reputation scoring important in the Threat Intelligence Module of Cortex XSOAR?
What does DBot use to score an indicator that has multiple reputation scores?
In the DBotScore context field, which context key would differentiate between multiple entries for the same indicator in a multi-TIP environment?
How can the required log ingestion license be determined when sizing a Cortex XSIAM deployment?
How does a clear understanding of a customer’s technical expertise assist in a hand off following the close of an opportunity?
What allows the use of predetermined Palo Alto Networks roles to assign access rights to Cortex XDR users?
The certificate used for decryption was installed as a trusted root CA certificate to ensure communication between the Cortex XDR Agent and Cortex XDR Management Console What action needs to be taken if the administrator determines the Cortex XDR Agents are not communicating with the Cortex XDR Management Console?
A customer wants the main Cortex XSOAR server installed in one site and wants to integrate with three other technologies in a second site.
What communications are required between the two sites if the customer wants to install a Cortex XSOAR engine in the second site?
Which two entities can be created as a behavioral indicator of compromise (BIOC)? (Choose two.)
Why is Premium Customer Success an important part of any Cortex bill of materials?