Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

How are dynamic endpoint groups created and managed in Cortex XDR?

A.

Endpoint groups require intervention to update the group with new endpoints when a new device is added to the network

B.

Each endpoint can belong to multiple groups simultaneously, allowing different security policies to be applied to the same device at the same time

C.

After an endpoint group is created, its assigned security policy cannot be changed without deleting and recreating the group

D.

Endpoint groups are defined based on fields such as OS type, OS version, and network segment

Full Access
Question # 5

Which components may be included in a Cortex XDR content update?

A.

Device control profiles, agent versions, and kernel support

B.

Behavioral Threat Protection (BTP) rules and local analysis logic

C.

Antivirus definitions and agent versions

D.

Firewall rules and antivirus definitions

Full Access
Question # 6

A security audit determines that the Windows Cortex XDR host-based firewall is not blocking outbound RDP connections for certain remote workers. The audit report confirms the following:

    All devices are running healthy Cortex XDR agents.

    A single host-based firewall rule to block all outbound RDP is implemented.

    The policy hosting the profile containing the rule applies to all Windows endpoints.

    The logic within the firewall rule is adequate.

    Further testing concludes RDP is successfully being blocked on all devices tested at company HQ.

    Network location configuration in Agent Settings is enabled on all Windows endpoints.What is the likely reason the RDP connections are not being blocked?

A.

The profile's default action for outbound traffic is set to Allow

B.

The pertinent host-based firewall rule group is only applied to external rule groups

C.

Report mode is set to Enabled in the report settings under the profile configuration

D.

The pertinent host-based firewall rule group is only applied to internal rule groups

Full Access
Question # 7

An XDR engineer is creating a correlation rule to monitor login activity on specific systems. When the activity is identified, an alert is created. The alerts are being generated properly but are missing the username when viewed. How can the username information be included in the alerts?

A.

Select “Initial Access” in the MITRE ATT&CK mapping to include the username

B.

Update the query in the correlation rule to include the username field

C.

Add a mapping for the username field in the alert fields mapping

D.

Add a drill-down query to the alert which pulls the username field

Full Access
Question # 8

What happens when the XDR Collector is uninstalled from an endpoint by using the Cortex XDR console?

A.

The files are removed immediately, and the machine is deleted from the system without any retention period

B.

The machine status remains active until manually removed, and the configuration data is retained for up to seven days

C.

It is uninstalled during the next heartbeat communication, machine status changes to Uninstalled, and the configuration data is retained for 90 days

D.

The associated configuration data is removed from the Action Center immediately after uninstallation

Full Access
Question # 9

What is the earliest time frame an alert could be automatically generated once the conditions of a new correlation rule are met?

A.

Between 30 and 45 minutes

B.

Immediately

C.

5 minutes or less

D.

Between 10 and 20 minutes

Full Access
Question # 10

When using Kerberos as the authentication method for Pathfinder, which two settings must be validated on the DNS server? (Choose two.)

A.

DNS forwarders

B.

Reverse DNS zone

C.

Reverse DNS records

D.

AD DS-integrated zones

Full Access
Question # 11

A multinational company with over 300,000 employees has recently deployed Cortex XDR in North America. The solution includes the Identity Threat Detection and Response (ITDR) add-on, and the Cortex team has onboarded the Cloud Identity Engine to the North American tenant. After waiting the required soak period and deploying enough agents to receive Identity and threat analytics detections, the team does not see user, group, or computer details for individuals from the European offices. What may be the reason for the issue?

A.

The XDR tenant is not in the same region as the Cloud Identity Engine

B.

The Cloud Identity Engine plug-in has not been installed and configured

C.

The Cloud Identity Engine needs to be activated in all global regions

D.

The ITDR add-on is not compatible with the Cloud Identity Engine

Full Access
Question # 12

Which step is required to configure a proxy for an XDR Collector?

A.

Edit the YAML configuration file with the new proxy information

B.

Restart the XDR Collector after configuring the proxy settings

C.

Connect the XDR Collector to the Pathfinder

D.

Configure the proxy settings on the Cortex XDR tenant

Full Access
Question # 13

Which two steps should be considered when configuring the Cortex XDR agent for a sensitive and highly regulated environment? (Choose two.)

A.

Enable critical environment versions

B.

Create an agent settings profile where the agent upgrade scope is maintenance releases only

C.

Create an agent settings profile, enable content auto-update, and include a delay of four days

D.

Enable minor content version updates

Full Access
Question # 14

Based on the SBAC scenario image below, when the tenant is switched to permissive mode, which endpoint(s) data will be accessible?

A.

E1 only

B.

E2 only

C.

E1, E2, and E3

D.

E1, E2, E3, and E4

Full Access
Question # 15

What will be the output of the function below?

L_TRIM("a* aapple", "a")

A.

' aapple'

B.

" aapple"

C.

"pple"

D.

" aapple-"

Full Access