New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What does the following output tell us?

A.

There is one low severity incident.

B.

Host shpapy_win10 had the most vulnerabilities.

C.

There is one informational severity alert.

D.

This is an actual output of the Top 10 hosts with the most malware.

Which version of python is used in live terminal?

A.

Python 2 and 3 with standard Python libraries

B.

Python 2 and 3 with specific XDR Python libraries developed by Palo Alto Networks

C.

Python 3 with specific XDR Python libraries developed by Palo Alto Networks

D.

Python 3 with standard Python libraries

While working the alerts involved in a Cortex XDR incident, an analyst has found that every alert in this incident requires an exclusion. What will the Cortex XDR console automatically do to this incident if all alerts contained have exclusions?

A.

mark the incident as Unresolved

B.

create a BIOC rule excluding this behavior

C.

create an exception to prevent future false positives

D.

mark the incident as Resolved – False Positive

What is the purpose of the Cortex Data Lake?

A.

a local storage facility where your logs and alert data can be aggregated

B.

a cloud-based storage facility where your firewall logs are stored

C.

the interface between firewalls and the Cortex XDR agents

D.

the workspace for your Cortex XDR agents to detonate potential malware files

What types of actions you can execute with live terminal session?

A.

Manage Network configurations, Quarantine Files, Run PowerShell scripts

B.

Manage Processes, Manage Files, Run Operating System Commands, Run Ruby Commands and Scripts

C.

Apply patches, Reboot System, send notification for end user, Run Python Commands and Scripts

D.

Manage Processes, Manage Files, Run Operating System Commands, Run Python Commands and Scripts

What is the standard installation disk space recommended to install a Broker VM?

A.

1GB disk space

B.

2GB disk space

C.

512GB disk space

D.

256GB disk space

Where would you view the WildFire report in an incident?

A.

next to relevant Key Artifacts in the incidents details page

B.

under Response --> Action Center

C.

under the gear icon --> Agent Audit Logs

D.

on the HUB page at apps.paloaltonetworks.com

Cortex XDR Analytics can alert when detecting activity matching the following MITRE ATT&CKTM techniques.

A.

Exfiltration, Command and Control, Collection

B.

Exfiltration, Command and Control, Privilege Escalation

C.

Exfiltration, Command and Control, Impact

D.

Exfiltration, Command and Control, Lateral Movement

What is the purpose of the Unit 42 team?

A.

Unit 42 is responsible for automation and orchestration of products

B.

Unit 42 is responsible for the configuration optimization of the Cortex XDR server

C.

Unit 42 is responsible for threat research, malware analysis and threat hunting

D.

Unit 42 is responsible for the rapid deployment of Cortex XDR agents

When using the “File Search and Destroy” feature, which of the following search hash type is supported?

A.

SHA256 hash of the file

B.

AES256 hash of the file

C.

MD5 hash of the file

D.

SHA1 hash of the file