Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

How does DBot score an indicator that has multiple reputation scores?

A.

uses the most severe score scores

B.

the reputation as undefined

C.

uses the average score

D.

uses the least severe score

Full Access
Question # 5

For which two purposes can Cortex XSOAR engines be deployed? (Choose two.)

A.

To execute recurring daybooks based on specific time schedules or changed to a feed

B.

To add processing resources for a heavily-used integration via load-balancing groups.

C.

To integrate with tools in a network location that the Cortex XSOAR server cannot reach directly

D.

To connect Cortex XSOAR to all required Palo Alto Networks resources such as the Cortex Gateway

Full Access
Question # 6

A customer has purchased Cortex XSOAR and has a need to rapidly stand up the product in their environment. The customer has stated that their internal staff are currently occupied with other projects.

Which Palo Alto Networks service offering should be recommended to the customer?

A.

Deployment

B.

Onboardinq

C.

Fast-Track

D.

QuickStart

Full Access
Question # 7

Which step is required to prepare the VDI Golden Image?

A.

Review any PE files that WildFire determined to be malicious

B.

Ensure the latest content updates are installed

C.

Run the VDI conversion tool

D.

Set the memory dumps to manual setting

Full Access
Question # 8

The certificate used for decryption was installed as a trusted toot CA certificate to ensure communication between the Cortex XDR Agent and Cortex XDR Management Console. What action needs to be taken if the administrator determines the Cortex XDR Agents are not communicating with the Cortex XDR Management Console?

A.

add paloaltonetworks.com to the SSL Decryption Exclusion list

B.

enable SSL decryption

C.

disable SSL decryption

D.

reinstall the root CA certificate

Full Access
Question # 9

A customer has purchased Cortex XDR and requires phone support for the product.

Which Palo Alto Networks offering would fulfill this need?

A.

Platinum Success

B.

Premium Success

C.

Diamond Success

D.

Standard Success

Full Access
Question # 10

Which Cortex XSIAM license is required if an organization needs to protect a cloud Kubernetes host?

A.

Attack Surface Management

B.

Cortex XSIAM Enterprise

C.

Identity Threat Detection and Response

D.

Cortex XSIAM Enterprise Plus

Full Access
Question # 11

What is a key difference between audit users and full users in Cortex XSOAR?

A.

Audit users can only view incidents, while full users can edit system components.

B.

Full users can only view dashboards, while audit users can investigate incidents.

C.

Audit users have read-only permission, white full users have read-write permission.

D.

Audit users can run scripts and playbooks, while full users can only view reports.

Full Access
Question # 12

Which feature of Cortex XSIAM displays an entire picture of an attack, including the originating process or delivery point?

A.

Sample analysis

B.

Correlation rule

C.

Causality View

D.

Automation playbook

Full Access
Question # 13

On a multi-tenanted v6.2 Cortex XSOAR server, which path leads to the server.log for "Tenant1"?

A.

/var/log/demisto/acc_Tenant1/server.log

B.

/var/log/demisto/Tenant1/server.log

C.

/var/lib/demisto/acc_Tenant1/server.log

D.

/var/lib/demisto/server.log

Full Access
Question # 14

Which method is used for third-party network data consumption?

A.

scripts library from the action center

B.

Open Database Connectivity (ODBC) connection to network device database

C.

Common Event Format (CEF) via broker Syslog module

D.

file reader to the /var/log/messages file on the device

Full Access
Question # 15

Which two types of indicators of compromise (IOCs) are available for creation in Cortex XDR? (Choose two.)

A.

registry

B.

file path

C.

hash

D.

hostname

Full Access
Question # 16

What is the primary mechanism for the attribution of attack surface data in Cortex Xpanse?

A.

Active scanning with network-installed agents

B.

Dark web monitoring

C.

Customer-provided asset inventory lists

D.

Scanning from public internet data sources

Full Access
Question # 17

A Cortex XSOAR customer wants to ingest emails from a single mailbox. The mailbox brings in reported phishing emails and email requests from human resources (HR) to onboard new users. The customer wants to run two separate workflows from this mailbox, one for phishing and one for onboarding.

What will allow Cortex XSOAR to accomplish this in the most efficient way?

A.

Create two instances of the email integration and classify one instance as ingesting incidents of type phishing and the other as ingesting incidents of type onboarding.

B.

Use an incident classifier based on a field in each type of email to classify those containing "Phish Alert" in the subject as phishing and those containing "Onboard Request" as onboarding.

C.

Create a playbook to process and determine incident type based on content of the email.

D.

Use machine learning (ML) to determine incident type.

Full Access
Question # 18

Which two statements apply to widgets? (Choose two.)

A.

All widgets are customizable.

B.

Dashboards cannot be shared across an organization.

C.

A widget can have its own time range that is different from the rest of the dashboard.

D.

Some widgets cannot be changed

Full Access
Question # 19

Which task setting allows context output to a specific key?

A.

extend context

B.

stop on errors

C.

task output

D.

lags

Full Access
Question # 20

If a customer activates a TMS tenant and has not purchased a Cortex Data Lake instance.

Palo Alto Networks will provide the customer with a free instance

What size is this free Cortex Data Lake instance?

A.

1 TB

B.

10 GB

C.

100 GB

D.

10 TB

Full Access
Question # 21

Rearrange the steps into the correct order for modifying an incident layout.

Full Access
Question # 22

When preparing the golden image in a Cortex XDR Virtual Desktop Infrastructure (VDI) deployment, which step is required?

A.

Disable automatic memory dumps.

B.

Scan the image using the imagepreptool.

C.

Launch the VDI conversion tool.

D.

Enable the VDI license timeout.

Full Access
Question # 23

Which source provides data for Cortex XDR?

A.

VMware NSX

B.

Amazon Alexa rank indicator

C.

Cisco ACI

D.

Linux endpoints

Full Access
Question # 24

Which two troubleshooting steps should be taken when an integration is failing to connect? (Choose two.)

A.

Ensure the playbook is set to run in quiet mode to minimize CPU usage and suppress errors

B.

Confirm the integration credentials or API keys are valid.

C.

Check the integration logs and enable a higher logging level, if needed, view the specific error.

D.

Confirm there are no dashboards or reports configured to use that integration instance.

Full Access
Question # 25

Which Cortex XDR capability prevents running malicious files from USB-connected removable equipment?

A.

Device customization

B.

Agent configuration

C.

Agent management

D.

Restrictions profile

Full Access
Question # 26

Which statement applies to the differentiation of Cortex XDR from security information and event management (SIEM)?

A.

SIEM has access to raw logs from agents, where Cortex XDR traditionally only gets alerts.

B.

Cortex XDR allows just logging into the console and out of the box the events were blocked as a proactive approach.

C.

Cortex XDR requires a large and diverse team of analysts and up to several weeks for simple actions like creating an alert.

D.

SIEM has been entirely designed and built as cloud-native, with the ability to stitch together cloud logs, on-premises logs, third-party logs, and endpoint logs.

Full Access
Question # 27

What method does the Traps agent use to identify malware during a scheduled scan?

A.

Heuristic analysis

B.

Local analysis

C.

Signature comparison

D.

WildFire hash comparison and dynamic analysis

Full Access
Question # 28

Which Cortex XDR capability extends investigations to an endpoint?

A.

Log Stitching

B.

Causality Chain

C.

Sensors

D.

Live Terminal

Full Access
Question # 29

Which command-line interface (CLI) query would retrieve the last three Splunk events?

A.

!search using=splunk_instance_1 query="* | last 3"

B.

!search using=splunk_instance_1 query="* | 3"

C.

!query using=splunk_instance_1 query="* | last 3"

D.

!search using=splunk_instance_1 query="* | head 3"

Full Access
Question # 30

Which attack method is a result of techniques designed to gain access through vulnerabilities in the code of an operating system (OS) or application?

A.

exploit

B.

malware

C.

phishing

D.

ransomware

Full Access
Question # 31

Which three Demisto incident type features can be customized under Settings > Advanced > Incident Types? (Choose three.)

A.

Define whether a playbook runs automatically when an incident type is encountered

B.

Set reminders for an incident SLA

C.

Add new fields to an incident type

D.

Define the way that incidents of a specific type are displayed in the system

E.

Drop new incidents of the same type that contain similar information

Full Access
Question # 32

What are the key capabilities of the ASM for Remote Workers module?

A.

Monitoring endpoint activity, managing firewall rules, and mitigating cybersecurity threats

B.

Gathering endpoint data, conducting internal scans, and automating network configurations

C.

Identifying office network vulnerabilities, monitoring remote workforce, and encrypting data

D.

Analyzing global scan data, identifying risky issues on remote networks, and providing internal insights

Full Access
Question # 33

In an Air-Gapped environment where the Docker package was manually installed after the Cortex XSOAR installation which action allows Cortex XSOAR to access Docker?

A.

create a “docker” group and add the "Cortex XSOAR" or "demisto" user to this group

B.

create a "Cortex XSOAR' or "demisto" group and add the "docker" user to this group

C.

disable the Cortex XSOAR service

D.

enable the docker service

Full Access
Question # 34

How many use cases should a POC success criteria document include?

A.

only 1

B.

3 or more

C.

no more than 5

D.

no more than 2

Full Access
Question # 35

Which option describes a Load-Balancing Engine Group?

A.

A group of engines that use an algorithm to efficiently share the workload for integrations

B.

A group of engines that ensure High Availability of Demisto backend databases.

C.

A group of engines that use an algorithm to efficiently share the workload for automation scripts

D.

A group of D2 agents that share processing power across multiple endpoints

Full Access
Question # 36

Which two areas of Cortex XDR are used for threat hunting activities? (Choose two.)

A.

indicators of compromise (IOC) rules

B.

query builder

C.

live terminal

D.

host insights module

Full Access
Question # 37

Cortex XDR can schedule recurring scans of endpoints for malware. Identify two methods for initiating an on-demand malware scan (Choose two )

A.

Response > Action Center

B.

the local console

C.

Telnet

D.

Endpoint > Endpoint Management

Full Access
Question # 38

Why is reputation scoring important in the Threat Intelligence Module of Cortex XSOAR?

A.

It allows for easy comparison between open-source intelligence and paid services.

B.

It deconflicts prioritization when two vendors give different scores for the same indicator.

C.

It provides a mathematical model for combining scores from multiple vendors.

D.

It helps identify threat intelligence vendors with substandard content.

Full Access
Question # 39

What does DBot use to score an indicator that has multiple reputation scores?

A.

most severe score

B.

undefined score

C.

average score

D.

least severe score

Full Access
Question # 40

Which option is required to prepare the VDI Golden Image?

A.

Configure the Golden Image as a persistent VDI

B.

Use the Cortex XDR VDI tool to obtain verdicts for all PE files

C.

Install the Cortex XOR Agent on the local machine

D.

Run the Cortex VDI conversion tool

Full Access
Question # 41

In the DBotScore context field, which context key would differentiate between multiple entries for the same indicator in a multi-TIP environment?

A.

Vendor

B.

Type

C.

Using

D.

Brand

Full Access
Question # 42

How can the required log ingestion license be determined when sizing a Cortex XSIAM deployment?

A.

Use the Cortex Data Lake Calculator to estimate the volume of third-party logs.

B.

Count the number of correlation sources and multiply by desired retention days.

C.

Ask the customer for average log ingestion estimates from their existing SIEM.

D.

Ask the customer to provide average daily alert volume.

Full Access
Question # 43

What is the retention requirement for Cortex Data Lake sizing?

A.

number of endpoints

B.

number of VM-Series NGFW

C.

number of days

D.

logs per second

Full Access
Question # 44

How does a clear understanding of a customer’s technical expertise assist in a hand off following the close of an opportunity?

A.

It enables customers to prepare for audits so they can demonstrate compliance.

B.

It helps in assigning additional technical tasks to the customer

C.

It allows implementation teams to bypass initial scoping exercises

D.

It enables post-sales teams to tailor their support and training appropriately

Full Access
Question # 45

What allows the use of predetermined Palo Alto Networks roles to assign access rights to Cortex XDR users?

A.

role-based access control

B.

cloud identity engine

C.

endpoint groups

D.

restrictions security profile

Full Access
Question # 46

The certificate used for decryption was installed as a trusted root CA certificate to ensure communication between the Cortex XDR Agent and Cortex XDR Management Console What action needs to be taken if the administrator determines the Cortex XDR Agents are not communicating with the Cortex XDR Management Console?

A.

add paloaltonetworks com to the SSL Decryption Exclusion list

B.

enable SSL decryption

C.

disable SSL decryption

D.

reinstall the root CA certificate

Full Access
Question # 47

A customer wants the main Cortex XSOAR server installed in one site and wants to integrate with three other technologies in a second site.

What communications are required between the two sites if the customer wants to install a Cortex XSOAR engine in the second site?

A.

The Cortex XSOAR server at the first site must be able to initiate a connection to the Cortex XSOAR engine at the second site.

B.

All connectivity is initiated from the Cortex XSOAR server on the first site via a managed cloud proxy.

C.

Dedicated site-to-site virtual private network (VPN) is required for the Cortex XSOAR server at the first site to initiate a connection to the Cortex XSOAR engine at the second site.

D.

The Cortex XSOAR engine at the first site must be able to initiate a connection to the Cortex XSOAR server at the second site.

Full Access
Question # 48

Which two entities can be created as a behavioral indicator of compromise (BIOC)? (Choose two.)

A.

process

B.

data

C.

event alert

D.

network

Full Access
Question # 49

Why is Premium Customer Success an important part of any Cortex bill of materials?

A.

It provides full implementation services.

B.

It provides managed threat hunting

C.

It provides instructor-led training courses.

D.

It provides expert-led configuration guidance.

Full Access
Question # 50

How can Cortex XSOAR save time when a phishing incident occurs?

A.

It can automatically email staff to warn them about the phishing attack and show them a copy of the email.

B.

It can automatically respond to the phishing email to unsubscribe from future emails.

C.

It can automatically purge the email from user mailboxes in which it has not yet opened.

D.

It can automatically identify every mailbox that received the phish and create corresponding cases for them.

Full Access