Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

In the Endpoint Data context menu of the Cortex XSIAM endpoints table, where will an analyst be able to determine which users accessed an endpoint via Live Terminal?

A.

View Endpoint Policy

B.

View Endpoint Logs

C.

View Incidents

D.

View Actions

Which attributes can be used as featured fields?

A.

Device-ID, URL, port, and indicator

B.

Endpoint-ID, alert source, critical asset, and threat name

C.

CIDR range, file hash, tags, and log source

D.

Hostnames, user names, IP addresses, and Active Directory

With regard to Attack Surface Rules, how often are external scans updated?

A.

Hourly

B.

Daily

C.

Weekly

D.

Monthly

Which configuration will ensure any alert involving a specific critical asset will always receive a score of 100?

A.

An asset as critical in Asset Inventory

B.

SmartScore to apply the specific score to the critical asset

C.

A user scoring rule for the critical asset

D.

A risk scoring policy for the critical asset

Which interval is the duration of time before an analytics detector can raise an alert?

A.

Activation period

B.

Test period

C.

Training period

D.

Deduplication period