Month End Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

PSE-Cortex Questions and Answers

Question # 6

Which Linux OS command will manually load Docker images onto the Cortex XSOAR server in an air-gapped environment?

A.

sudo repoquery -a --installed

B.

sudo demistoserver-x.x-xxxx.sh -- -tools=load

C.

sudo docker ps load

D.

sudo docker load -i YOUR_DOCKER_FILE.tar

Full Access
Question # 7

A Cortex XSOAR customer wants to send a survey to users asking them to input their manager's email for a training use case so the manager can receive status reports on the employee's training. However, the customer is concerned users will provide incorrect information to avoid sending status updates to their manager.

How can Cortex XSOAR most efficiently sanitize user input prior to using the responses in the playbook?

A.

Create a task that sends the survey responses to the analyst via email. If the responses are incorrect, the analyst fills out the correct response in the survey.

B.

Create a manual task to ask the analyst to validate the survey response in the platform.

C.

Create a sub-playbook and import a list of manager emails into XSOAR. Use a conditional task comparison to check if the response matches an email on the list. If no matches are found, loop the sub-playbook and send the survey back to the user until a match is found.

D.

Create a conditional task comparison to check if the response contains a valid email address.

Full Access
Question # 8

Where is the output of the task visible when a playbook task errors out?

A.

playbook editor

B.

XSOAR audit log

C.

/var/log/messages

D.

War Room of the incident

Full Access
Question # 9

Why is it important to document notes from the Proof of Value (POV) for post-sales hand off?

A.

To generate additional training material for the POV’s production implementation

B.

To certify that the POV was completed and meets all customer requirements

C.

To allow implementation teams to bypass scooping exercises and shorten delivery time

D.

To ensure the implementation teams understand the customer use cases and priorities

Full Access
Question # 10

Which attack method is a result of techniques designed to gain access through vulnerabilities in the code of an operating system (OS) or application?

A.

exploit

B.

malware

C.

phishing

D.

ransomware

Full Access
Question # 11

The customer has indicated they need EDR data collection capabilities, which Cortex XDR license is required?

A.

Cortex XDR Pro per TB

B.

Cortex XDR Prevent

C.

Cortex XDR Endpoint

D.

Cortex XDR Pro Per Endpoint

Full Access
Question # 12

Rearrange the steps into the correct order for modifying an incident layout.

Full Access
Question # 13

What is the primary function of an engine in Cortex XSOAR?

A.

To execute playbooks, scripts, commands, and integrations

B.

To manage multiple Cortex XSOAR tenants

C.

To provide a user interface for security analysts

D.

To store and manage incident data, remediation plans, and documentation

Full Access
Question # 14

When initiated, which Cortex XDR capability allows immediate termination of the process-or entire process tree-on an anomalous process discovered during investigation of a security event?

A.

Live sensors

B.

Live terminal

C.

Log forwarding

D.

Log stitching

Full Access
Question # 15

Which feature in Cortex XSIAM extends analytics detections to all mapped network and authentication data?

A.

Threat feed integration

B.

Automation daybooks

C.

Parsing rules

D.

Data models

Full Access
Question # 16

In addition to incident volume, which four critical factors must be evaluated to determine effectiveness and ROI on cybersecurity planning and technology?

A.

Analyst, training costs, duplicated, false positives

B.

People, staffing costs, duplicates, false positives

C.

People, security controls, mean time to detect, false positives

D.

Standard operating procedures, staffing costs, duplicates, mean time to respond

Full Access
Question # 17

Which deployment type supports installation of an engine on Windows, Mac OS. and Linux?

A.

RPM

B.

SH

C.

DEB

D.

ZIP

Full Access
Question # 18

Which statement applies to the malware protection flow in Cortex XDR Prevent?

A.

Local static analysis happens before a WildFire verdict check.

B.

In the final step, the block list is verified.

C.

A trusted signed file is exempt from local static analysis.

D.

Hash comparisons come after local static analysis.

Full Access
Question # 19

Which two formats are supported by Whitelist? (Choose two)

A.

Regex

B.

STIX

C.

CSV

D.

CIDR

Full Access
Question # 20

Given the exception thrown in the accompanying image by the Demisto REST API integration, which action would most likely solve the problem?

Which two playbook functionalities allow looping through a group of tasks during playbook execution? (Choose two.)

A.

Generic Polling Automation Playbook

B.

Playbook Tasks

C.

Sub-Play books

D.

Playbook Functions

Full Access
Question # 21

Which two areas of Cortex XDR are used for threat hunting activities? (Choose two.)

A.

indicators of compromise (IOC) rules

B.

query builder

C.

live terminal

D.

host insights module

Full Access
Question # 22

An antivirus refresh project was initiated by the IT operations executive. Who is the best source for discussion about the project's operational considerations'?

A.

endpoint manager

B.

SOC manager

C.

SOC analyst

D.

desktop engineer

Full Access
Question # 23

An administrator has a critical group of systems running Windows XP SP3 that cannot be upgraded The administrator wants to evaluate the ability of Traps to protect these systems and the word processing applications running on them

How should an administrator perform this evaluation?

A.

Gather information about the word processing applications and run them on a Windows XP SP3 VM Determine if any of the applications are vulnerable and run the exploit with an exploitation tool

B.

Run word processing exploits in a latest version of Windows VM in a controlled and isolated environment. Document indicators of compromise and compare to Traps protection capabilities

C.

Run a known 2015 flash exploit on a Windows XP SP3 VM. and run an exploitation tool that acts as a listener Use the results to demonstrate Traps capabilities

D.

Prepare the latest version of Windows VM Gather information about the word processing applications, determine if some of them are vulnerable and prepare a working exploit for at least one of them Execute with an exploitation tool

Full Access
Question # 24

Which two Cortex XSOAR incident type features can be customized under Settings > Advanced > Incident Types? (Choose two.)

A.

adding new fields to an incident type

B.

setting reminders for an incident service level agreement

C.

defining whether a playbook runs automatically when an incident type is encountered

D.

dropping new incidents of the same type that contain similar information

Full Access
Question # 25

Which two items are stitched to the Cortex XDR causality chain'' (Choose two)

A.

firewall alert

B.

SIEM alert

C.

full URL

D.

registry set value

Full Access
Question # 26

What is a benefit offered by Cortex XSOAR?

A.

It provides advanced customization capabilities.

B.

It provides real-time protection across hosts and containers.

C.

It enables consolidation of multiple point products into a single integrated service.

D.

It enables a comprehensive view of the customer environment with regard to digital employee productivity.

Full Access
Question # 27

Which statement applies to the differentiation of Cortex XDR from security information and event management (SIEM)?

A.

SIEM has access to raw logs from agents, where Cortex XDR traditionally only gets alerts.

B.

Cortex XDR allows just logging into the console and out of the box the events were blocked as a proactive approach.

C.

Cortex XDR requires a large and diverse team of analysts and up to several weeks for simple actions like creating an alert.

D.

SIEM has been entirely designed and built as cloud-native, with the ability to stitch together cloud logs, on-premises logs, third-party logs, and endpoint logs.

Full Access
Question # 28

Which consideration should be taken into account before deploying Cortex XSOAR?

A.

Which cybersecurity framework to implement for Secure Operations Center (SOC) operations

B.

Whether communication with internal or external applications is required

C.

How to configure network firewalls for optimal performance

D.

Which endpoint protection software to integrate with Cortex XSOAR

Full Access
Question # 29

Which Cortex XDR capability allows for the immediate termination of a process discovered during investigation of a security event?

A.

file explorer

B.

Log stitching

C.

live sensor

D.

live terminal

Full Access
Question # 30

Which integration allows data to be pushed from Cortex XSOAR into Splunk?

A.

ArcSight ESM integration

B.

SplunkUpdate integration

C.

Demisto App for Splunk integration

D.

SplunkPY integration

Full Access
Question # 31

How does DBot score an indicator that has multiple reputation scores?

A.

uses the most severe score scores

B.

the reputation as undefined

C.

uses the average score

D.

uses the least severe score

Full Access
Question # 32

Which feature of Cortex XSIAM helps analyst reduce the noise and false positives that often plague traditional SIEM systems?

A.

Alert range indicators

B.

Al-generated correlation rules

C.

Automatic incident scoring

D.

Dynamic alarm fields

Full Access
Question # 33

What is the function of reputation scoring in the Threat Intelligence Module of Cortex XSIAM?

A.

It provides a statistical model for combining scores from multiple vendors

B.

It resolves conflicting scores from different vendors with the same indicator.

C.

It allows for comparison between open-source intelligence and paid services.

D.

It helps identify threat feed vendors with invalid content.

Full Access
Question # 34

An Administrator is alerted to a Suspicious Process Creation security event from multiple users.

The users believe that these events are false positives Which two steps should the administrator take to confirm the false positives and create an exception? (Choose two )

A.

With the Malware Security profile, disable the "Prevent Malicious Child Process Execution" module

B.

Within the Malware Security profile add the specific parent process, child process, and command line argument to the child process whitelist

C.

In the Cortex XDR security event, review the specific parent process, child process, and command line arguments

D.

Contact support and ask for a security exception.

Full Access
Question # 35

Which two statements apply to widgets? (Choose two.)

A.

All widgets are customizable.

B.

Dashboards cannot be shared across an organization.

C.

A widget can have its own time range that is different from the rest of the dashboard.

D.

Some widgets cannot be changed

Full Access
Question # 36

Which feature of Cortex XSIAM displays an entire picture of an attack, including the originating process or delivery point?

A.

Sample analysis

B.

Correlation rule

C.

Causality View

D.

Automation playbook

Full Access
Question # 37

What are two ways a customer can configure user authentication access Cortex Xpanse? (Choose two.)

A.

Secure Shell (SSH)

B.

SAML

C.

RADIUS

D.

Customer Support Portal

Full Access
Question # 38

Which product enables the discovery, exchange, and contribution of security automation playbooks, built into Cortex XSOAR?

A.

XSOAR Threat Intelligence Platform (TIP)

B.

XSOAR Automated Systems

C.

XSOAR Ticketing Systems

D.

XSOAR Marketplace

Full Access
Question # 39

Cortex XDR can schedule recurring scans of endpoints for malware. Identify two methods for initiating an on-demand malware scan (Choose two )

A.

Response > Action Center

B.

the local console

C.

Telnet

D.

Endpoint > Endpoint Management

Full Access
Question # 40

Which integration allows searching and displaying Splunk results within Cortex XSOAR?

A.

SplunkPY integration

B.

Demisto App for Splunk integration

C.

XSOAR REST API integration

D.

Splunk integration

Full Access
Question # 41

Which Cortex XSIAM feature can be used to onboard data sources?

A.

Marketplace Integration

B.

Playbook

C.

Data Ingestion Dashboard

D.

Asset Inventory

Full Access
Question # 42

In Cortex XDR Prevent, which three matching criteria can be used to dynamically group endpoints? (Choose three )

A.

alert root cause

B.

hostname

C.

domain/workgroup membership

D.

OS

E.

presence of Flash executable

Full Access
Question # 43

What are two manual actions allowed on War Room entries? (Choose two.)

A.

Mark as artifact

B.

Mark as scheduled entry

C.

Mark as note

D.

Mark as evidence

Full Access
Question # 44

In addition to migration and go-live, what are two best-practice steps for migrating from SIEM to Cortex XSIAM? (Choose two.)

A.

Execution

B.

Certification

C.

Conclusion

D.

Testing

Full Access
Question # 45

In an Air-Gapped environment where the Docker package was manually installed after the Cortex XSOAR installation which action allows Cortex XSOAR to access Docker?

A.

create a “docker” group and add the "Cortex XSOAR" or "demisto" user to this group

B.

create a "Cortex XSOAR' or "demisto" group and add the "docker" user to this group

C.

disable the Cortex XSOAR service

D.

enable the docker service

Full Access
Question # 46

What is a benefit of user entity behavior analytics (UEBA) over security information and event management (SIEM)?

A.

SIEMs supports only agentless scanning, not agent-based workload protection across VMs, containers/Kubernetes.

B.

UEBA can add trusted signers of Windows or Mac processes to a whitelist in the Endpoint Security Manager (ESM) Console.

C.

SIEMs have difficulty detecting unknown or advanced security threats that do not involve malware, such as credential theft.

D.

UEBA establishes a secure connection in which endpoints can be routed, and it collects and forwards logs and files for analysis.

Full Access
Question # 47

If an anomalous process is discovered while investigating the cause of a security event, you can take immediate action to terminate the process or the whole process tree, and block processes from running by initiating which Cortex XDR capability?

A.

Live Sensors

B.

File Explorer

C.

Log Stitching

D.

Live Terminal

Full Access
Question # 48

When running a Cortex XSIAM proof of value (POV), why is it important to deploy the Cortex XDR agent?

A.

It will prevent all threats in the environment.

B.

It is used to enforce license compliance.

C.

It runs automation daybooks on the endpoints.

D.

It provides telemetry for stitching and analytics.

Full Access
Question # 49

What is the result of creating an exception from an exploit security event?

A.

White lists the process from Wild Fire analysis

B.

exempts the user from generating events for 24 hours

C.

exempts administrators from generating alerts for 24 hours

D.

disables the triggered EPM for the host and process involve

Full Access
Question # 50

Which playbook functionality allows grouping of tasks to create functional building blocks?

A.

playbook features

B.

sub-playbooks

C.

conditional tasks

D.

manual tasks

Full Access