Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

XSIAM-Analyst Questions and Answers

Question # 6

In which two locations can mapping be configured for indicators? (Choose two.)

A.

Feed Integration settings

B.

Classification & Mapping tab

C.

STIX parser code

D.

Indicator Configuration in Object Setup

Full Access
Question # 7

Which configuration will ensure any alert involving a specific critical asset will always receive a score of 100?

A.

An asset as critical in Asset Inventory

B.

SmartScore to apply the specific score to the critical asset

C.

A user scoring rule for the critical asset

D.

A risk scoring policy for the critical asset

Full Access
Question # 8

A Cortex XSIAM analyst is investigating a security incident involving a workstation after having deployed a Cortex XDR agent for 45 days. The incident details include the Cortex XDR Analytics Alert "Uncommon remote scheduled task creation." Which response will mitigate the threat?

A.

Initiate the endpoint isolate action to contain the threat.

B.

Revoke user access and conduct a user audit

C.

Prioritize blocking the source IP address to prevent further login attempts.

D.

Allow list the processes to reduce alert noise.

Full Access
Question # 9

While investigating an alert, an analyst notices that a URL indicator has a related alert from a previous incident. The related alert has the same URL but it resolved to a different IP address.

Which combination of two actions should the analyst take to resolve this issue? (Choose two.)

A.

Expire the URL indicator

B.

Remove the relationship between the URL and the older IP address

C.

Enrich the IP address indicator associated with the previous alert

D.

Enrich the URL indicator

Full Access
Question # 10

A Cortex XSIAM analyst is reading a blog that references an unfamiliar critical zero-day vulnerability. This vulnerability has been weaponized, and there is evidence that it is being exploited by threat actors targeting a customer's industry. Where can the analyst go within Cortex XSIAM to learn more about this vulnerability and any potential impacts on the customer environment?

A.

Threat Intel Management -> Sample Analysis

B.

Threat Intel Management -> Indicators

C.

Attack Surface -> Threat Response Center

D.

Attack Surface -> Attack Surface Rules

Full Access
Question # 11

Which attributes can be used as featured fields?

A.

Device-ID, URL, port, and indicator

B.

Endpoint-ID, alert source, critical asset, and threat name

C.

CIDR range, file hash, tags, and log source

D.

Hostnames, user names, IP addresses, and Active Directory

Full Access
Question # 12

Which dataset should an analyst search when looking for Palo Alto Networks NGFW logs?

A.

dataset = pan_dss_raw

B.

dataset = ngfw

C.

dataset = panwngfwtraffic_raw

D.

dataset = ngfw_threat_panw_raw

Full Access
Question # 13

SCENARIO:

A security analyst has been assigned a ticket from the help desk stating that users are experiencing errors when attempting to open files on a specific network share. These errors state that the file format cannot be opened. IT has verified that the file server is online and functioning, but that all files have unusual extensions attached to them.

The security analyst reviews alerts within Cortex XSIAM and identifies malicious activity related to a possible ransomware attack on the file server. This incident is then escalated to the incident response team for further investigation.

Upon reviewing the incident, the responders confirm that ransomware was successfully executed on the file server. Other details of the attack are noted below:

• An unpatched vulnerability on an externally facing web server was exploited for initial access

• The attackers successfully used Mimikatz to dump sensitive credentials that were used for privilege escalation

• PowerShell was used on a Windows server for additional discovery, as well as lateral movement to other systems

• The attackers executed SystemBC RAT on multiple systems to maintain remote access

• Ransomware payload was downloaded on the file server via an external site "file io"

QUESTION STATEMENT:

The incident responders are attempting to determine why Mimikatz was able to successfully run during the attack.

Which exploit protection profile in Cortex XSIAM should be reviewed to ensure it is configured with an Action Mode of Block?

A.

Logical Exploits Protection

B.

Browser Exploits Protection

C.

Known Vulnerable Process Protection

D.

Operating System Exploit Protection

Full Access
Question # 14

Which pane in the User Risk View will identify the country from which a user regularly logs in, based on the past few weeks of data?

A.

Login Attempts

B.

Common Locations

C.

Actual Activity

D.

Latest Authentication Attempts

Full Access
Question # 15

While investigating an incident on the Incident Overview page, an analyst notices that the playbook encountered an error. Upon playbook work plan review, it is determined that the error was caused by a timeout. However, the analyst does not have the necessary permissions to fix or create a new playbook.

Given the critical nature of the incident, what can the analyst do to ensure the playbook continues executing the remaining steps?

A.

Clone the playbook, remove the faulty step and run the new playbook to bypass the error

B.

Contact TAC to resolve the task error, as the playbook cannot proceed without it

C.

Navigate to the step where the error occurred and run the task again

D.

Pause the step with the error, thus automatically triggering the execution of the remaining steps.

Full Access