Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which method is used for third-party network data consumption?

A.

scripts library from the action center

B.

Open Database Connectivity (ODBC) connection to network device database

C.

Common Event Format (CEF) via broker Syslog module

D.

file reader to the /var/log/messages file on the device

Which CLI query would bring back Notable Events from Splunk?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Which element displays an entire picture of an attack, including the root cause or delivery point?

A.

Cortex XSOAR Work Plan

B.

Cortex SOC Orchestrator

C.

Cortex Data Lake

D.

Cortex XDR Causality View

Which command-line interface (CLI) query would retrieve the last three Splunk events?

A.

!search using=splunk_instance_1 query="* | last 3"

B.

!search using=splunk_instance_1 query="* | 3"

C.

!query using=splunk_instance_1 query="* | last 3"

D.

!search using=splunk_instance_1 query="* | head 3"

What are two manual actions allowed on War Room entries? (Choose two.)

A.

Mark as artifact

B.

Mark as scheduled entry

C.

Mark as note

D.

Mark as evidence

A prospect has agreed to do a 30-day POC and asked to integrate with a product that Demisto currently does not have an integration with. How should you respond?

A.

Extend the POC window to allow the solution architects to build it

B.

Tell them we can build it with Professional Services.

C.

Tell them custom integrations are not created as part of the POC

D.

Agree to build the integration as part of the POC

Approximately how many Cortex XSOAR marketplace integrations exist?

A.

Between 1-400

B.

Between 400-700

C.

Between 700-2000

D.

Over 2000

What is the retention requirement for Cortex Data Lake sizing?

A.

number of endpoints

B.

number of VM-Series NGFW

C.

number of days

D.

logs per second

What are the key capabilities of the ASM for Remote Workers module?

A.

Monitoring endpoint activity, managing firewall rules, and mitigating cybersecurity threats

B.

Gathering endpoint data, conducting internal scans, and automating network configurations

C.

Identifying office network vulnerabilities, monitoring remote workforce, and encrypting data

D.

Analyzing global scan data, identifying risky issues on remote networks, and providing internal insights

What is the difference between an exception and an exclusion?

A.

An exception is based on rules and exclusions are on alerts

B.

An exclusion is based on rules and exceptions are based on alerts.

C.

An exception does not exist

D.

An exclusion does not exist