Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

What is the default embedded search engine used by Phantom?

A.

Embedded Splunk search engine.

B.

Embedded Phantom search engine.

C.

Embedded Elastic search engine.

D.

Embedded Django search engine.

Full Access
Question # 5

Where in SOAR can a user view the JSON data for a container?

A.

In the analyst queue.

B.

On the Investigation page.

C.

In the data ingestion display.

D.

In the audit log.

Full Access
Question # 6

What are the differences between cases and events?

A.

Case: potential threats.

Events: identified as a specific kind of problem and need a structured approach.

B.

Cases: only include high-level incident artifacts.

Events: only include low-level incident artifacts.

C.

Cases: contain a collection of containers.

Events: contain potential threats.

D.

Cases: incidents with a known violation and a plan for correction.

Events: occurrences in the system that may require a response.

Full Access
Question # 7

Where can the Splunk App for SOAR Export be downloaded from?

A.

GitHub and Splunkbase.

B.

SOAR Community and GitHub.

C.

Splunkbase and SOAR Community.

D.

Splunk Answers and Splunkbase.

Full Access
Question # 8

To limit the impact of custom code on the VPE, where should the custom code be placed?

A.

A custom container or a separate KV store.

B.

A separate code repository.

C.

A custom function block.

D.

A separate container.

Full Access
Question # 9

Phantom supports multiple user authentication methods such as LDAP and SAML2. What other user authentication method is supported?

A.

SAML3

B.

PIV/CAC

C.

Biometrics

D.

OpenID

Full Access
Question # 10

Which of the following can be configured in the ROI Settings?

A.

Number of full time employees (FTEs).

B.

Time lost.

C.

Analyst hours per month.

D.

Annual analyst salary.

Full Access
Question # 11

Which of the following queries would return all artifacts that contain a SHA1 file hash?

A.

https:// /rest/artifact?_filter_cef_md5_insull=false

B.

https:// /rest/artifact?_filter_cef_Shal_contains=””

C.

https:// /rest/artifact?_filter_cef_shal_insull=False

D.

https:// /rest/artifact?_filter_shal__insull=False

Full Access
Question # 12

Which of the following can be configured in the ROl Settings?

A.

Analyst hours per month.

B.

Time lost.

C.

Number of full time employees (FTEs).

D.

Annual analyst salary.

Full Access
Question # 13

When writing a custom function that uses regex to extract the domain name from a URL, a user wants to create a new artifact for the extracted domain. Which of the following Python API calls will create a new artifact?

A.

phantom.new_artifact ()

B.

phantom. update ()

C.

phantom.create_artifact ()

D.

phantom.add_artifact ()

Full Access
Question # 14

How is it possible to evaluate user prompt results?

A.

Set action_result.summary. status to required.

B.

Set the user prompt to reinvoke if it times out.

C.

Set action_result. summary. response to required.

D.

Add a decision Mode

Full Access
Question # 15

In a playbook, more than one Action block can be active at one time. What is this called?

A.

Serial Processing

B.

Parallel Processing

C.

Multithreaded Processing

D.

Juggle Processing

Full Access
Question # 16

What are the components of the I2A2 design methodology?

A.

Inputs, Interactions, Actions, Apps

B.

Inputs, Interactions, Actions, Artifacts

C.

Inputs, Interactions, Apps, Artifacts

D.

Inputs, Interactions, Actions, Assets

Full Access
Question # 17

How can more than one user perform tasks in a workbook?

A.

Any user in a role with write access to the case's workbook can be assigned to tasks.

B.

Add the required users to the authorized list for the container.

C.

Any user with a role that has Perform Task enabled can execute tasks for workbooks.

D.

The container owner can assign any authorized user to any task in a workbook.

Full Access
Question # 18

Which of the following are examples of things commonly done with the Phantom REST APP

A.

Use Django queries; use curl to create a container and add artifacts to it; remove temporary lists.

B.

Use Django queries; use Docker to create a container and add artifacts to it; remove temporary lists.

C.

Use Django queries; use curl to create a container and add artifacts to it; add action blocks.

D.

Use SQL queries; use curl to create a container and add artifacts to it; remove temporary lists.

Full Access
Question # 19

When assigning an input parameter to an action while building a playbook, a user notices the artifact value they are looking for does not appear in the auto-populated list.

How is it possible to enter the unlisted artifact value?

A.

Type the CEF datapath in manually.

B.

Delete and recreate the artifact.

C.

Edit the artifact to enable the List as Parameter option for the CEF value.

D.

Edit the container to allow CEF parameters.

Full Access
Question # 20

A user has written a playbook that calls three other playbooks, one after the other. The user notices that the second playbook starts executing before the first one completes. What is the cause of this behavior?

A.

Incorrect Join configuration on the second playbook.

B.

The first playbook is performing poorly.

C.

The steep option for the second playbook is not set to a long enough interval.

D.

Synchronous execution has not been configured.

Full Access
Question # 21

A customer wants to design a modular and reusable set of playbooks that all communicate with each other. Which of the following is a best practice for data sharing across playbooks?

A.

Use the py-postgresq1 module to directly save the data in the Postgres database.

B.

Cal the child playbooks getter function.

C.

Create artifacts using one playbook and collect those artifacts in another playbook.

D.

Use the Handle method to pass data directly between playbooks.

Full Access
Question # 22

What users are included in a new installation of SOAR?

A.

The admin and automation users are included by default.

B.

The admin, power, and user users are included by default.

C.

Only the admin user is included by default.

D.

No users are included by default.

Full Access
Question # 23

When analyzing events, a working on a case, significant items can be marked as evidence. Where can ail of a case's evidence items be viewed together?

A.

Workbook page Evidence tab.

B.

Evidence report.

C.

Investigation page Evidence tab.

D.

At the bottom of the Investigation page widget panel.

Full Access
Question # 24

A user selects the New option under Sources on the menu. What will be displayed?

A.

A list of new assets.

B.

The New Data Ingestion wizard.

C.

A list of new data sources.

D.

A list of new events.

Full Access
Question # 25

What is the simplest way to pass data between playbooks?

A.

Action results

B.

File system

C.

Artifacts

D.

KV Store

Full Access
Question # 26

A filter block with only one condition configured which states: artifact.*.cef .sourceAddress !- , would permit which of the following data to pass forward to the next block?

A.

Null IP addresses

B.

Non-null IP addresses

C.

Non-null destinationAddresses

D.

Null values

Full Access
Question # 27

Which of the following can be edited or deleted in the Investigation page?

A.

Action results

B.

Comments

C.

Approval records

D.

Artifact values

Full Access
Question # 28

Is it possible to import external Python libraries such as the time module?

A.

No.

B.

No, but this can be changed by setting the proper permissions.

C.

Yes, in the global block.

D.

Yes. from a drop-down menu.

Full Access