Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Palo Alto Networks Systems Engineer Professional - Cortex

Last Update 3 days ago Total Questions : 168

The Palo Alto Networks Systems Engineer Professional - Cortex content is now fully updated, with all current exam questions added 3 days ago. Deciding to include PSE-Cortex-Pro-24 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our PSE-Cortex-Pro-24 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these PSE-Cortex-Pro-24 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Palo Alto Networks Systems Engineer Professional - Cortex practice test comfortably within the allotted time.

Question # 4

Cortex XDR can schedule recurring scans of endpoints for malware. Identify two methods for initiating an on-demand malware scan (Choose two )

A.

Response > Action Center

B.

the local console

C.

Telnet

D.

Endpoint > Endpoint Management

Question # 5

An Administrator is alerted to a Suspicious Process Creation security event from multiple users.

The users believe that these events are false positives Which two steps should the administrator take to confirm the false positives and create an exception? (Choose two )

A.

With the Malware Security profile, disable the "Prevent Malicious Child Process Execution" module

B.

Within the Malware Security profile add the specific parent process, child process, and command line argument to the child process whitelist

C.

In the Cortex XDR security event, review the specific parent process, child process, and command line arguments

D.

Contact support and ask for a security exception.

Question # 6

What are two reasons incident investigation is needed in Cortex XDR? (Choose two.)

A.

No solution will stop every attack requiring further investigation of activity.

B.

Insider Threats may not be blocked and initial activity may go undetected.

C.

Analysts need to acquire forensic artifacts of malware that has been blocked by the XDR agent.

D.

Detailed reports are needed for senior management to justify the cost of XDR.

Question # 7

Which task setting allows context output to a specific key?

A.

extend context

B.

stop on errors

C.

task output

D.

lags

Question # 8

How can the required log ingestion license be determined when sizing a Cortex XSIAM deployment?

A.

Use the Cortex Data Lake Calculator to estimate the volume of third-party logs.

B.

Count the number of correlation sources and multiply by desired retention days.

C.

Ask the customer for average log ingestion estimates from their existing SIEM.

D.

Ask the customer to provide average daily alert volume.

Question # 9

What are two manual actions allowed on War Room entries? (Choose two.)

A.

Mark as artifact

B.

Mark as scheduled entry

C.

Mark as note

D.

Mark as evidence

Question # 10

Which two log types should be configured for firewall forwarding to the Cortex Data Lake for use by Cortex XDR? (Choose two)

A.

Security Event

B.

HIP

C.

Correlation

D.

Analytics

Go to page: