New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

XDR-Analyst Questions and Answers

Question # 6

What license would be required for ingesting external logs from various vendors?

A.

Cortex XDR Pro per Endpoint

B.

Cortex XDR Vendor Agnostic Pro

C.

Cortex XDR Pro per TB

D.

Cortex XDR Cloud per Host

Full Access
Question # 7

What is the purpose of targeting software vendors in a supply-chain attack?

A.

to take advantage of a trusted software delivery method.

B.

to steal users’ login credentials.

C.

to access source code.

D.

to report Zero-day vulnerabilities.

Full Access
Question # 8

You can star security events in which two ways? (Choose two.)

A.

Create an alert-starring configuration.

B.

Create an Incident-starring configuration.

C.

Manually star an alert.

D.

Manually star an Incident.

Full Access
Question # 9

Which of the following policy exceptions applies to the following description?

‘An exception allowing specific PHP files’

A.

Support exception

B.

Local file threat examination exception

C.

Behavioral threat protection rule exception

D.

Process exception

Full Access
Question # 10

Which Exploit Protection Module (EPM) can be used to prevent attacks based on OS function?

A.

UASLR

B.

JIT Mitigation

C.

Memory Limit Heap Spray Check

D.

DLL Security

Full Access
Question # 11

What types of actions you can execute with live terminal session?

A.

Manage Network configurations, Quarantine Files, Run PowerShell scripts

B.

Manage Processes, Manage Files, Run Operating System Commands, Run Ruby Commands and Scripts

C.

Apply patches, Reboot System, send notification for end user, Run Python Commands and Scripts

D.

Manage Processes, Manage Files, Run Operating System Commands, Run Python Commands and Scripts

Full Access
Question # 12

Which statement best describes how Behavioral Threat Protection (BTP) works?

A.

BTP injects into known vulnerable processes to detect malicious activity.

B.

BTP runs on the Cortex XDR and distributes behavioral signatures to all agents.

C.

BTP matches EDR data with rules provided by Cortex XDR.

D.

BTP uses machine Learning to recognize malicious activity even if it is not known.

Full Access
Question # 13

Which built-in dashboard would be the best option for an executive, if they were looking for the Mean Time to Resolution (MTTR) metric?

A.

Security Manager Dashboard

B.

Data Ingestion Dashboard

C.

Security Admin Dashboard

D.

Incident Management Dashboard

Full Access
Question # 14

Where can SHA256 hash values be used in Cortex XDR Malware Protection Profiles?

A.

in the macOS Malware Protection Profile to indicate allowed signers

B.

in the Linux Malware Protection Profile to indicate allowed Java libraries

C.

SHA256 hashes cannot be used in Cortex XDR Malware Protection Profiles

D.

in the Windows Malware Protection Profile to indicate allowed executables

Full Access
Question # 15

Which profiles can the user use to configure malware protection in the Cortex XDR console?

A.

Malware Protection profile

B.

Malware profile

C.

Malware Detection profile

D.

Anti-Malware profile

Full Access
Question # 16

In Windows and macOS you need to prevent the Cortex XDR Agent from blocking execution of a file based on the digital signer. What is one way to add an exception for the singer?

A.

In the Restrictions Profile, add the file name and path to the Executable Files allow list.

B.

Create a new rule exception and use the singer as the characteristic.

C.

Add the signer to the allow list in the malware profile.

D.

Add the signer to the allow list under the action center page.

Full Access
Question # 17

In incident-related widgets, how would you filter the display to only show incidents that were “starred”?

A.

Create a custom XQL widget

B.

This is not currently supported

C.

Create a custom report and filter on starred incidents

D.

Click the star in the widget

Full Access
Question # 18

What is the function of WildFire for Cortex XDR?

A.

WildFire runs in the cloud and analyses alert data from the XDR agent to check for behavioural threats.

B.

WildFire is the engine that runs on the local agent and determines whether behavioural threats are occurring on the endpoint.

C.

WildFire accepts and analyses a sample to provide a verdict.

D.

WildFire runs entirely on the agent to quickly analyse samples and provide a verdict.

Full Access
Question # 19

Network attacks follow predictable patterns. If you interfere with any portion of this pattern, the attack will be neutralized. Which of the following statements is correct?

A.

Cortex XDR Analytics allows to interfere with the pattern as soon as it is observed on the firewall.

B.

Cortex XDR Analytics does not interfere with the pattern as soon as it is observed on the endpoint.

C.

Cortex XDR Analytics does not have to interfere with the pattern as soon as it is observed on the endpoint in order to prevent the attack.

D.

Cortex XDR Analytics allows to interfere with the pattern as soon as it is observed on the endpoint.

Full Access
Question # 20

When investigating security events, which feature in Cortex XDR is useful for reverting the changes on the endpoint?

A.

Remediation Automation

B.

Machine Remediation

C.

Automatic Remediation

D.

Remediation Suggestions

Full Access
Question # 21

Which minimum Cortex XDR agent version is required for Kubernetes Cluster?

A.

Cortex XDR 6.1

B.

Cortex XDR 7.4

C.

Cortex XDR 7.5

D.

Cortex XDR 5.0

Full Access
Question # 22

A file is identified as malware by the Local Analysis module whereas WildFire verdict is Benign, Assuming WildFire is accurate. Which statement is correct for the incident?

A.

It is true positive.

B.

It is false positive.

C.

It is a false negative.

D.

It is true negative.

Full Access
Question # 23

Which statement regarding scripts in Cortex XDR is true?

A.

Any version of Python script can be run.

B.

The level of risk is assigned to the script upon import.

C.

Any script can be imported including Visual Basic (VB) scripts.

D.

The script is run on the machine uploading the script to ensure that it is operational.

Full Access
Question # 24

To stop a network-based attack, any interference with a portion of the attack pattern is enough to prevent it from succeeding. Which statement is correct regarding the Cortex XDR Analytics module?

A.

It does not interfere with any portion of the pattern on the endpoint.

B.

It interferes with the pattern as soon as it is observed by the firewall.

C.

It does not need to interfere with the any portion of the pattern to prevent the attack.

D.

It interferes with the pattern as soon as it is observed on the endpoint.

Full Access
Question # 25

Live Terminal uses which type of protocol to communicate with the agent on the endpoint?

A.

NetBIOS over TCP

B.

WebSocket

C.

UDP and a random port

D.

TCP, over port 80

Full Access
Question # 26

When reaching out to TAC for additional technical support related to a Security Event; what are two critical pieces of information you need to collect from the Agent? (Choose Two)

A.

The agent technical support file.

B.

The prevention archive from the alert.

C.

The distribution id of the agent.

D.

A list of all the current exceptions applied to the agent.

E.

The unique agent id.

Full Access
Question # 27

How does Cortex XDR agent for Windows prevent ransomware attacks from compromising the file system?

A.

by encrypting the disk first.

B.

by utilizing decoy Files.

C.

by retrieving the encryption key.

D.

by patching vulnerable applications.

Full Access