Spring Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

SecOps-Pro Questions and Answers

Question # 6

How do sensors function in Cortex XSIAM?

A.

They monitor endpoint agent health.

B.

They monitor data ingestion health.

C.

They assist with log stitching.

D.

They collect logs and telemetry data.

Full Access
Question # 7

What can be used to triage and determine if an artifact in Cortex XDR is malicious? (Choose one answer)

A.

Alert severity

B.

MITRE tactic

C.

SmartScore

D.

WildFire report

Full Access
Question # 8

Where is the data retrieved by an integration task (such as a user's email address or a file's reputation) stored within an incident so that other playbook tasks can access it?

A.

War Room

B.

Context Data

C.

Incident Fields

D.

Evidence Board

Full Access
Question # 9

Which dashboard or module in Cortex XSIAM provides visibility into unmanaged devices, unauthorized shadow IT, and cloud assets that do not currently have a Cortex agent installed?

A.

Host Insights

B.

Asset Inventory

C.

Cloud Discovery & Exposure

D.

Identity Analytics

Full Access
Question # 10

Which SOC role investigates a new low severity alert? (Choose one answer)

A.

SOC manager

B.

Threat hunter

C.

Triage specialist

D.

Incident responder

Full Access
Question # 11

Which task should a threat hunter include in the investigation when a Cortex XDR incident contains alerts about a malicious process?

A.

Immediately isolate the endpoint and delete the identified file.

B.

Search for the SHA256 file hash on other endpoints in the environment.

C.

Add the SHA256 file hash to the Cortex XDR global block list.

D.

Disable the account of the user responsible for initiating the process.

Full Access
Question # 12

What is enabled by Role-Based Access Control (RBAC) in Cortex XDR?

A.

Management of permissions and assignment of administrator access rights.

B.

Ability to manage Cortex XDR features based on job function.

C.

Automated response to detected threats based on user roles.

D.

Granular control and visibility over network traffic policies based on user roles.

Full Access
Question # 13

How can an administrator run a Cortex XSOAR playbook regularly at a specific time and day of the week?

A.

By configuring the playbook to run on a specific date and time

B.

By creating a job that will run the playbook

C.

By creating a scheduled report that will run the playbook

D.

By creating a script that will run the playbook

Full Access
Question # 14

Which activities are facilitated through the War Room in Cortex XSOAR? (Choose one answer)

A.

Running security playbooks, scripts, and commands

B.

Creating, editing, and deleting tasks in the workplan

C.

Viewing a summary of case details and alerts

D.

Conducting initial investigation of incident data and threat intelligence

Full Access
Question # 15

During which phase of the NIST Incident Response lifecycle does a SOC team conduct a "Lessons Learned" meeting to improve future response efforts?

A.

Preparation

B.

Detection and Analysis

C.

Containment, Eradication, and Recovery

D.

Post-Incident Activity

Full Access
Question # 16

Which scripting language would create a custom widget in Cortex XDR that shows the top five accounts with failed Windows logons in the past 24 hours?

A.

XQL

B.

JavaScript

C.

Python

D.

PowerShell

Full Access
Question # 17

How does the "Unit 42 Intel" integration directly assist a SOC analyst within the Cortex XDR or XSIAM Incident view?

A.

It automatically resets the user's password in Active Directory.

B.

It provides a "threat card" with actor profiles, known aliases, and related MITRE ATT & CK techniques.

C.

It opens a 24/7 chat window with a dedicated Unit 42 forensic investigator.

D.

It provides the source code of the malware identified in the incident.

Full Access
Question # 18

Which two statements are relevant to reports in Cortex XDR? (Choose two.)

A.

They can be sent in a password protected PDF version.

B.

They can be automatically pushed to the corporate intranet.

C.

They can use mock data for visualization.

D.

They can have an attached screenshot of an XQL query widget.

Full Access