Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A company has a highly segmented network where the Cortex XSOAR server cannot directly communicate with an on-premises mail server. Which component should be deployed in the mail server's segment to facilitate integration?

A.

Broker VM

B.

XSOAR Engine

C.

Cortex Gateway

D.

XSOAR Proxy

Which action should an administrator take to create automated response actions when a user account is compromised? (Choose one answer)

A.

Map the events as a type of Cortex XSOAR incident, then run a playbook.

B.

Run a custom script from the Cortex XDR script library.

C.

Create a script in Cortex XSOAR that will run a playbook based on the scenario.

D.

Create playbook triggers in Cortex XSIAM and run playbooks for each alert.

Which Cortex XSIAM feature uses machine learning to automatically group related alerts into a single, manageable incident to reduce alert fatigue?

A.

XDM Mapping

B.

Alert Stitching

C.

Incident Stitching

D.

Analytics Engine

In Cortex XSOAR, what happens by default to an indicator (such as a malicious IP) once it reaches its configured expiration date?

A.

It is permanently deleted from the XSOAR database.

B.

It is moved to the "Archive" tab and cannot be used in playbooks.

C.

It remains in the system but is marked as "Expired" and no longer actively pushed to integrations.

D.

Its verdict is automatically changed from "Malicious" to "Benign".

Which component of Cortex XDR is designed to detect insider threats?

A.

Forensics

B.

Identity Analytics

C.

Cloud Identity Engine

D.

Host Insights

Which Cortex XSOAR feature is used to ensure that specific data points from an incoming alert (such as a "Source_Address" from a firewall log) are correctly assigned to the standardized "Source IP" field within the XSOAR incident?

A.

Classification

B.

Mapping

C.

Data Normalization

D.

Playbook Transformation

How does the "Unit 42 Intel" integration directly assist a SOC analyst within the Cortex XDR or XSIAM Incident view?

A.

It automatically resets the user's password in Active Directory.

B.

It provides a "threat card" with actor profiles, known aliases, and related MITRE ATT & CK techniques.

C.

It opens a 24/7 chat window with a dedicated Unit 42 forensic investigator.

D.

It provides the source code of the malware identified in the incident.

What is enabled by Role-Based Access Control (RBAC) in Cortex XDR?

A.

Management of permissions and assignment of administrator access rights.

B.

Ability to manage Cortex XDR features based on job function.

C.

Automated response to detected threats based on user roles.

D.

Granular control and visibility over network traffic policies based on user roles.

Which Cortex XSIAM component uses machine learning to automatically build a baseline of "normal" behavior for every user and host in the network, and then provides a searchable profile of their historical activity and risk level?

A.

XQL Engine

B.

Entity Profiling

C.

Broker VM

D.

Data Ingestion Service

During which phase of the NIST Incident Response lifecycle does a SOC team conduct a "Lessons Learned" meeting to improve future response efforts?

A.

Preparation

B.

Detection and Analysis

C.

Containment, Eradication, and Recovery

D.

Post-Incident Activity