Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Palo Alto Networks XDR Engineer

Last Update 14 hours ago Total Questions : 50

The Palo Alto Networks XDR Engineer content is now fully updated, with all current exam questions added 14 hours ago. Deciding to include XDR-Engineer practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our XDR-Engineer exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these XDR-Engineer sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Palo Alto Networks XDR Engineer practice test comfortably within the allotted time.

Question # 1

In addition to using valid authentication credentials, what is required to enable the setup of the Database Collector applet on the Broker VM to ingest database activity?

A.

Valid SQL query targeting the desired data

B.

Access to the database audit log

C.

Database schema exported in the correct format

D.

Access to the database transaction log

Question # 2

A correlation rule is created to detect potential insider threats by correlating user login events from one dataset with file access events from another dataset. The rule must retain all user login events, even if there are no matching file access events, to ensure no login activity is missed.

text

Copy

dataset = x

| join (dataset = y)

Which type of join is required to maintain all records from dataset x, even if there are no matching events from dataset y?

A.

Inner

B.

Left

C.

Right

D.

Outer

Question # 3

What happens when the XDR Collector is uninstalled from an endpoint by using the Cortex XDR console?

A.

The files are removed immediately, and the machine is deleted from the system without any retention period

B.

The machine status remains active until manually removed, and the configuration data is retained for up to seven days

C.

It is uninstalled during the next heartbeat communication, machine status changes to Uninstalled, and the configuration data is retained for 90 days

D.

The associated configuration data is removed from the Action Center immediately after uninstallation

Question # 4

Using the Cortex XDR console, how can additional network access be allowed from a set of IP addresses to an isolated endpoint?

A.

Add entries in Configuration section of Security Settings

B.

Add entries in the Allowed Domains section of Security Settings for the tenant

C.

Add entries in Exceptions Configuration section of Isolation Exceptions

D.

Add entries in Response Actions section of Agent Settings profile

Question # 5

Which method will drop undesired logs and reduce the amount of data being ingested?

A.

[COLLECT:vendor="vendor", product="product", target_brokers="", no_hit=drop] * drop _raw_log contains "undesired logs";

B.

[INGEST:vendor="vendor", product="product", target_dataset="vendor_product_raw", no_hit=drop] * filter _raw_log not contains "undesired logs";

C.

[COLLECT:vendor="vendor", product="product", target_dataset="", no_hit=drop] * drop _raw_log contains "undesired logs";

D.

[INGEST:vendor="vendor", product="product", target_brokers="vendor_product_raw", no_hit=keep] * filter _raw_log not contains "undesired logs";

Question # 6

An insider compromise investigation has been requested to provide evidence of an unauthorized removable drive being mounted on a company laptop. Cortex XDR agent is installed with default prevention agent settings profile and default extension "Device Configuration" profile. Where can an engineer find the evidence?

A.

Check Host Inventory - > Mounts

B.

dataset = xdr_data | filter event_type = ENUM.MOUNT and event_sub_type = ENUM.MOUNT_DRIVE_MOUNT

C.

The requested data requires additional configuration to be captured

D.

preset = device_control

Question # 7

The most recent Cortex XDR agents are being installed at a newly acquired company. A list with endpoint types (i.e., OS, hardware, software) is provided to the engineer. What should be cross-referenced for the Linux systems listed regarding the OS types and OS versions supported?

A.

Content Compatibility Matrix

B.

Kernel Module Version Support

C.

End-of-Life Summary

D.

Agent Installer Certificate

Question # 8

How long is data kept in the temporary hot storage cache after being queried from cold storage?

A.

1 hour, re-queried to a maximum of 12 hours

B.

24 hours, re-queried to a maximum of 7 days

C.

24 hours, re-queried to a maximum of 14 days

D.

1 hour, re-queried to a maximum of 24 hours

Question # 9

Log events from a previously deployed Windows XDR Collector agent are no longer being observed in the console after an OS upgrade. Which aspect of the log events is the probable cause of this behavior?

A.

They are greater than 5MB

B.

They are in Winlogbeat format

C.

They are in Filebeat format

D.

They are less than 1MB

Question # 10

What will be the output of the function below?

L_TRIM("a* aapple", "a")

A.

' aapple'

B.

" aapple"

C.

"pple"

D.

" aapple-"

Go to page: