Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which activities are facilitated through the War Room in Cortex XSOAR? (Choose one answer)

A.

Running security playbooks, scripts, and commands

B.

Creating, editing, and deleting tasks in the workplan

C.

Viewing a summary of case details and alerts

D.

Conducting initial investigation of incident data and threat intelligence

In which scenario would an organization benefit from Cortex XDR compared to an EDR solution?

A.

A business wants to integrate data from network traffic, cloud environments, and identity systems for a unified threat landscape.

B.

A corporation wants to monitor endpoint activities for advanced threats and gain visibility into endpoint behaviors.

C.

A customer relies on manual processes for incident detection and response with minimal use of automated tools and analytics.

D.

A company requires endpoint security that focuses on isolating and responding to threats at the endpoint level.

Why would a security engineer be unable to activate Cortex XDR analytics when configuring data sources and alert sensors during a Cortex XSIAM evaluation? (Choose one answer)

A.

The engineer needs to install the Analytics engine.

B.

Pathfinder must be activated before turning on analytics.

C.

Baseline requirements must be met before activating analytics.

D.

The engineer still needs to activate the identity Analytics engine.

Which response action in Cortex XSIAM would be unavailable to a SOC analyst investigating an incident involving a Linux server?

A.

File search and destroy

B.

Live Terminal session initiation

C.

Running a script

D.

Halting network access

Which metric is used by SOC management to measure the average "Dwell Time"—the duration between a successful compromise and the moment it is first identified by a security tool or analyst?

A.

MTTR (Mean Time to Respond)

B.

MTTA (Mean Time to Acknowledge)

C.

MTTD (Mean Time to Detect)

D.

MTTC (Mean Time to Contain)

An analyst wants to create a detection rule that triggers when any process attempts to perform code injection into the lsass.exe process, regardless of whether the file hash of the source process is known to be malicious. Which type of rule should be created?

A.

IOC (Indicator of Compromise)

B.

BIOC (Behavioral Indicator of Compromise)

C.

Correlation Rule

D.

Analytics Alert

Which Cortex XDR Exploit Prevention Module (EPM) is specifically designed to detect and block "Return-Oriented Programming" (ROP) techniques by monitoring for "stack pivoting" or "jump to return" instructions?

A.

Anti-Exploit Core

B.

JMP2RET / Stack Pivot Protection

C.

Local Privilege Escalation Protection

D.

DLL Security

Which two statements are relevant to reports in Cortex XDR? (Choose two.)

A.

They can be sent in a password protected PDF version.

B.

They can be automatically pushed to the corporate intranet.

C.

They can use mock data for visualization.

D.

They can have an attached screenshot of an XQL query widget.