Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which configuration will ensure any alert involving a specific critical asset will always receive a score of 100?

A.

An asset as critical in Asset Inventory

B.

SmartScore to apply the specific score to the critical asset

C.

A user scoring rule for the critical asset

D.

A risk scoring policy for the critical asset

Full Access
Question # 5

An analyst conducting a threat hunt needs to collect multiple files from various endpoints. The analyst begins the file retrieval process by using the Action Center, but upon review of the retrieved files, notices that the list is incomplete and missing files, including kernel files.

What could be the reason for the issue?

A.

The file retrieval policy applied to the endpoints may restrict access to certain system or kernel files

B.

The retrieval process is limited to 500 MB in total file size

C.

The endpoint agents were in offline mode during the file retrieval process, causing some files to be skipped

D.

The analyst must manually retrieve kernel files by accessing the machine directly

Full Access
Question # 6

Which dataset should an analyst search when looking for Palo Alto Networks NGFW logs?

A.

dataset = pan_dss_raw

B.

dataset = ngfw

C.

dataset = panwngfwtraffic_raw

D.

dataset = ngfw_threat_panw_raw

Full Access
Question # 7

A SOC team member implements an incident starring configuration, but incidents created before this configuration were not starred.

What is the cause of this behavior?

A.

The analyst must manually star incidents after determining which alerts within the incident were automatically starred

B.

It takes 48 hours for the configuration to take effect

C.

Starring is applied to alerts after they have been merged into incidents, but incidents are not starred

D.

Starring configuration is applied to the newly created alerts, and the incident is subsequently starred

Full Access
Question # 8

Which two actions can an analyst take to reduce the number of false positive alerts generated by a custom BIOC? (Choose two.)

A.

Implement a global exception in the prevention profile.

B.

Implement a shunt in a BIOC bypass rule

C.

Implement an alert exclusion rule.

D.

Implement a BIOC rule exception

Full Access
Question # 9

With regard to Attack Surface Rules, how often are external scans updated?

A.

Hourly

B.

Daily

C.

Weekly

D.

Monthly

Full Access
Question # 10

A threat hunter discovers a true negative event from a zero-day exploit that is using privilege escalation to launch "Malware pdf.exe". Which XQL query will always show the correct user context used to launch "Malware pdf.exe"?

A.

config case_sensitive = false | dataset = xdr_data | filter event_type = ENUM.PROCESS | filter action_process_image_name = "Malware.pdf.exe" | fields causality_actor_effective_username

B.

config case_sensitive = false | dataset = xdr_data | filter event_type = ENUM.PROCESS | filter action_process_image_name = "Malware.pdf.exe" | fields actor_process_username

C.

config case_sensitive = false | datamodel dataset = xdrdata | filter xdm.source.process.name = "Malware.pdf.exe" | fields xdm.target.user.username

D.

config case_sensitive = false | dataset = xdr_data | filter event_type = ENUM.PROCESS | filter action_process_image_name = "Malware.pdf.exe" | fields action_process_username

Full Access
Question # 11

Which type of task can be used to create a decision tree in a playbook?

A.

Sub-playbook

B.

Standard

C.

Job

D.

Conditional

Full Access
Question # 12

While investigating an alert, an analyst notices that a URL indicator has a related alert from a previous incident. The related alert has the same URL but it resolved to a different IP address.

Which combination of two actions should the analyst take to resolve this issue? (Choose two.)

A.

Expire the URL indicator

B.

Remove the relationship between the URL and the older IP address

C.

Enrich the IP address indicator associated with the previous alert

D.

Enrich the URL indicator

Full Access
Question # 13

Which two actions will allow a security analyst to review updated commands from the core pack and interpret the results without altering the incident audit? (Choose two)

A.

Run the core commands directly from the playground and invite other collaborators.

B.

Run the core commands directly from the Command and Scripts menu inside playground

C.

Create a playbook with the commands and run it from within the War Room

D.

Run the core commands directly by typing them into the playground CLI.

Full Access
Question # 14

During an investigation, an analyst runs the reputation script for an indicator that is listed as Suspicious. The new reputation results display in the War Room as Malicious; however, the indicator verdict does not change.

What is the cause of this behavior?

A.

The indicator has been excluded.

B.

The indicator exists as an IOC rule.

C.

The indicator is expired.

D.

The indicator verdict was manually set to Suspicious.

Full Access
Question # 15

Which pane in the User Risk View will identify the country from which a user regularly logs in, based on the past few weeks of data?

A.

Login Attempts

B.

Common Locations

C.

Actual Activity

D.

Latest Authentication Attempts

Full Access