Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

PSE-Cortex-Pro-24 Questions and Answers

Question # 6

What is the primary function of an engine in Cortex XSOAR?

A.

To execute playbooks, scripts, commands, and integrations

B.

To manage multiple Cortex XSOAR tenants

C.

To provide a user interface for security analysts

D.

To store and manage incident data, remediation plans, and documentation

Full Access
Question # 7

The certificate used for decryption was installed as a trusted toot CA certificate to ensure communication between the Cortex XDR Agent and Cortex XDR Management Console. What action needs to be taken if the administrator determines the Cortex XDR Agents are not communicating with the Cortex XDR Management Console?

A.

add paloaltonetworks.com to the SSL Decryption Exclusion list

B.

enable SSL decryption

C.

disable SSL decryption

D.

reinstall the root CA certificate

Full Access
Question # 8

Which two troubleshooting steps should be taken when an integration is failing to connect? (Choose two.)

A.

Ensure the playbook is set to run in quiet mode to minimize CPU usage and suppress errors

B.

Confirm the integration credentials or API keys are valid.

C.

Check the integration logs and enable a higher logging level, if needed, view the specific error.

D.

Confirm there are no dashboards or reports configured to use that integration instance.

Full Access
Question # 9

A customer has purchased Cortex XDR and requires 24/7 monitoring of the platform. However, the customer only has staff available during business hours.

Which Palo Alto Networks offering would best meet this requirement?

A.

Security Orchestration, Automation and Response

B.

Security Information and Event Management

C.

Managed Detection and Response

D.

Network Detection and Response

Full Access
Question # 10

A customer wants the main Cortex XSOAR server installed in one site and wants to integrate with three other technologies in a second site.

What communications are required between the two sites if the customer wants to install a Cortex XSOAR engine in the second site?

A.

The Cortex XSOAR server at the first site must be able to initiate a connection to the Cortex XSOAR engine at the second site.

B.

All connectivity is initiated from the Cortex XSOAR server on the first site via a managed cloud proxy.

C.

Dedicated site-to-site virtual private network (VPN) is required for the Cortex XSOAR server at the first site to initiate a connection to the Cortex XSOAR engine at the second site.

D.

The Cortex XSOAR engine at the first site must be able to initiate a connection to the Cortex XSOAR server at the second site.

Full Access
Question # 11

How does Cortex XSOAR automation save time when a phishing incident occurs?

A.

By developing an integration.

B.

By responding to management with risk scores

C.

By purging unopened phishing email from user mailboxes

D.

By emailing staff to inform them of phishing attack in advance

Full Access
Question # 12

Which technology allows a customer to integrate Cortex Xpanse with third-party applications or services, assets, and IP ranges while leveraging investigation capabilities?

A.

POSTMAN

B.

Webhook

C.

REST API

D KPI

Full Access
Question # 13

Which solution profiles network behavior metadata, not payloads and files, allowing effective operation regardless of encrypted or unencrypted communication protocols, like HTTPS?

A.

endpoint protection platform (EPP)

B.

Security Information and Event Management (SIEM)

C.

endpoint detection and response (EDR)

D.

Network Detection and Response (NDR)

Full Access
Question # 14

Which statement applies to the differentiation of Cortex XDR from security information and event management (SIEM)?

A.

SIEM has access to raw logs from agents, where Cortex XDR traditionally only gets alerts.

B.

Cortex XDR allows just logging into the console and out of the box the events were blocked as a proactive approach.

C.

Cortex XDR requires a large and diverse team of analysts and up to several weeks for simple actions like creating an alert.

D.

SIEM has been entirely designed and built as cloud-native, with the ability to stitch together cloud logs, on-premises logs, third-party logs, and endpoint logs.

Full Access
Question # 15

What does the Cortex XSOAR "Saved by Dbot" widget calculate?

A.

amount saved in Dollars according to actions carried out by all users in Cortex XSOAR across all incidents

B.

amount saved in Dollars by using Cortex XSOAR instead of other products

C.

amount of time saved by each playbook task within an incident

D.

amount of time saved by Dbot's machine learning (ML) capabilities

Full Access
Question # 16

Which Cortex XDR capability extends investigations to an endpoint?

A.

Log Stitching

B.

Causality Chain

C.

Sensors

D.

Live Terminal

Full Access
Question # 17

Cortex XDR can schedule recurring scans of endpoints for malware. Identify two methods for initiating an on-demand malware scan (Choose two )

A.

Response > Action Center

B.

the local console

C.

Telnet

D.

Endpoint > Endpoint Management

Full Access
Question # 18

Which Cortex XDR capability prevents running malicious files from USB-connected removable equipment?

A.

Device customization

B.

Agent configuration

C.

Agent management

D.

Restrictions profile

Full Access
Question # 19

Rearrange the steps into the correct order for modifying an incident layout.

Full Access
Question # 20

Where is the best place to find official resource material?

A.

Online forums

B.

Video series

C.

Administrator's guide

D.

Technical blogs

Full Access
Question # 21

When a Demisto Engine is part of a Load-Balancing group it?

A.

Must be in a Load-Balancing group with at least another 3 members

B.

It must have port 443 open to allow the Demisto Server to establish a connection

C.

Can be used separately as an engine, only if connected to the Demisto Server directly

D.

Cannot be used separately and does not appear in the in the engines drop-down menu when configuring an integration instance

Full Access
Question # 22

Approximately how many Cortex XSOAR marketplace integrations exist?

A.

Between 1-400

B.

Between 400-700

C.

Between 700-2000

D.

Over 2000

Full Access
Question # 23

Which two filter operators are available in Cortex XDR? (Choose two.)

A.

< >

B.

Contains

C.

=

D.

Is Contained By

Full Access
Question # 24

What method does the Traps agent use to identify malware during a scheduled scan?

A.

Heuristic analysis

B.

Local analysis

C.

Signature comparison

D.

WildFire hash comparison and dynamic analysis

Full Access
Question # 25

Which feature in Cortex XSIAM extends analytics detections to all mapped network and authentication data?

A.

Threat feed integration

B.

Automation daybooks

C.

Parsing rules

D.

Data models

Full Access
Question # 26

How does the integration between Cortex Xpanse and Cortex XSOAR benefit security teams?

A.

By enhancing firewall rule management

B.

By enabling automatic incident response actions for internet-based incidents

C.

By providing real-time threat intelligence feeds

D.

By automating endpoint detection and response (EDR) processes

Full Access
Question # 27

When running a Cortex XSIAM proof of value (POV), why is it important to deploy the Cortex XDR agent?

A.

It will prevent all threats in the environment.

B.

It is used to enforce license compliance.

C.

It runs automation daybooks on the endpoints.

D.

It provides telemetry for stitching and analytics.

Full Access
Question # 28

In the DBotScore context field, which context key would differentiate between multiple entries for the same indicator in a multi-TIP environment?

A.

Vendor

B.

Type

C.

Using

D.

Brand

Full Access
Question # 29

What is used to display only file entries in a War Room?

A.

files from War Room CLI WW

B.

incident files section in layout builder

C.

files and attachments filters

D.

/files from War Room CLI

Full Access
Question # 30

Which option describes a Load-Balancing Engine Group?

A.

A group of engines that use an algorithm to efficiently share the workload for integrations

B.

A group of engines that ensure High Availability of Demisto backend databases.

C.

A group of engines that use an algorithm to efficiently share the workload for automation scripts

D.

A group of D2 agents that share processing power across multiple endpoints

Full Access
Question # 31

When preparing the golden image in a Cortex XDR Virtual Desktop Infrastructure (VDI) deployment, which step is required?

A.

Disable automatic memory dumps.

B.

Scan the image using the imagepreptool.

C.

Launch the VDI conversion tool.

D.

Enable the VDI license timeout.

Full Access
Question # 32

Which service helps uncover attackers wherever they hide by combining world-class threat hunters with Cortex XDR technology that runs on integrated endpoint, network, and cloud data sources?

A.

Cloud Identity Engine

B.

Managed Threat Hunting

C.

virtual desktop infrastructure (VDI)

D.

Threat Intelligence Platform (TIP)

Full Access
Question # 33

A Cortex Xpanse customer receives an email regarding an upcoming product update and wants to get more information on the new features.

In which resource can the customer access this information?

A.

Administrator Guide

B.

Release Notes

C.

Compatibility Matrix

D.

LIVEcommunitv

Full Access
Question # 34

An administrator of a Cortex XDR protected production environment would like to test its ability to protect users from a known flash player exploit.

What is the safest way to do it?

A.

The administrator should attach a copy of the weapomzed flash file to an email, send the email to a selected group of employees, and monitor the Events tab on the Cortex XDR console

B.

The administrator should use the Cortex XDR tray icon to confirm his corporate laptop is fully protected then open the weaponized flash file on his machine, and monitor the Events tab on the Cortex XDR console.

C.

The administrator should create a non-production Cortex XDR test environment that accurately represents the production environment, introduce the weaponized flash file, and monitor the Events tab on the Cortex XDR console.

D.

The administrator should place a copy of the weaponized flash file on several USB drives, scatter them around the office and monitor the Events tab on the Cortex XDR console

Full Access
Question # 35

Which CLI query would bring back Notable Events from Splunk?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 36

In Cortex XDR Prevent, which three matching criteria can be used to dynamically group endpoints? (Choose three )

A.

alert root cause

B.

hostname

C.

domain/workgroup membership

D.

OS

E.

presence of Flash executable

Full Access
Question # 37

A customer has 2700 endpoints. There is currently concern about recent attacks in their industry and threat intelligence from a third-party subscription. In an attempt to be proactive, phishing simulations have been prioritized, but the customer wants to gain more visibility and remediation capabilities specific to their network traffic.

Which Cortex product provides these capabilities?

Full Access
Question # 38

A Cortex XSIAM customer is unable to access their Cortex XSIAM tenant.

Which resource can the customer use to validate the uptime of Cortex XSIAM?

A.

Administrator Guide

B.

LIVEcommunity

C.

Release Notes

D.

Palo Alto Networks Status Page

Full Access
Question # 39

Which consideration should be taken into account before deploying Cortex XSOAR?

A.

Which cybersecurity framework to implement for Secure Operations Center (SOC) operations

B.

Whether communication with internal or external applications is required

C.

How to configure network firewalls for optimal performance

D.

Which endpoint protection software to integrate with Cortex XSOAR

Full Access
Question # 40

The prospect is deciding whether to go with a phishing or a ServiceNow use case as part of their POC We have integrations for both but a playbook for phishing only Which use case should be used for the POC?

A.

phishing

B.

either

C.

ServiceNow

D.

neither

Full Access
Question # 41

Why is it important to document notes from the Proof of Value (POV) for post-sales hand off?

A.

To generate additional training material for the POV’s production implementation

B.

To certify that the POV was completed and meets all customer requirements

C.

To allow implementation teams to bypass scooping exercises and shorten delivery time

D.

To ensure the implementation teams understand the customer use cases and priorities

Full Access
Question # 42

Which option is required to prepare the VDI Golden Image?

A.

Configure the Golden Image as a persistent VDI

B.

Use the Cortex XDR VDI tool to obtain verdicts for all PE files

C.

Install the Cortex XOR Agent on the local machine

D.

Run the Cortex VDI conversion tool

Full Access
Question # 43

Which two formats are supported by Whitelist? (Choose two)

A.

Regex

B.

STIX

C.

CSV

D.

CIDR

Full Access
Question # 44

A prospect has agreed to do a 30-day POC and asked to integrate with a product that Demisto currently does not have an integration with. How should you respond?

A.

Extend the POC window to allow the solution architects to build it

B.

Tell them we can build it with Professional Services.

C.

Tell them custom integrations are not created as part of the POC

D.

Agree to build the integration as part of the POC

Full Access
Question # 45

How do sub-playbooks affect the Incident Context Data?

A.

When set to private, task outputs do not automatically get written to the root context

B.

When set to private, task outputs automatically get written to the root context

C.

When set to global, allows parallel task execution.

D.

When set to global, sub-playbook tasks do not have access to the root context

Full Access
Question # 46

On a multi-tenanted v6.2 Cortex XSOAR server, which path leads to the server.log for "Tenant1"?

A.

/var/log/demisto/acc_Tenant1/server.log

B.

/var/log/demisto/Tenant1/server.log

C.

/var/lib/demisto/acc_Tenant1/server.log

D.

/var/lib/demisto/server.log

Full Access
Question # 47

What allows the use of predetermined Palo Alto Networks roles to assign access rights to Cortex XDR users?

A.

role-based access control

B.

cloud identity engine

C.

endpoint groups

D.

restrictions security profile

Full Access
Question # 48

Which integration allows searching and displaying Splunk results within Cortex XSOAR?

A.

SplunkPY integration

B.

Demisto App for Splunk integration

C.

XSOAR REST API integration

D.

Splunk integration

Full Access
Question # 49

Which deployment type supports installation of an engine on Windows, Mac OS. and Linux?

A.

RPM

B.

SH

C.

DEB

D.

ZIP

Full Access
Question # 50

Which Cortex XDR Agent capability prevents loading malicious files from USB-connected removable equipment?

A.

Agent Configuration

B.

Device Control

C.

Device Customization

D.

Agent Management

Full Access