Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

For a critical incident, Cortex XSIAM suggests several playbooks which should have been executed automatically.

Why were the playbooks not executed?

A.

Misconfiguration of the connector instance has occurred.

B.

Playbook classifier was not configured for the alert type.

C.

Installation of the appropriate content pack was not completed.

D.

Playbook loggers were not configured for those alerts.

An analyst is responding to a critical incident involving a potential ransomware attack. The analyst immediately initiates full isolation on the compromised endpoint using Cortex XSIAM to prevent the malware from spreading across the network. However, the analyst now needs to collect additional forensic evidence from the isolated machine, including memory dumps and disk images without reconnecting it to the network. Which action will allow the analyst to collect the required forensic evidence while ensuring the endpoint remains fully isolated?

A.

Using the endpoint isolation feature to create a secure tunnel for evidence collection

B.

Collecting the evidence manually through the agent by accessing the machine directly and running "Generate Support File"

C.

Using the management console to remotely run a predefined forensic playbook on the associated alert

D.

Disabling full isolation temporarily to allow forensic tools to communicate with the endpoint

Which attribution evidence will have the lowest confidence level when evaluating assets to determine if they belong to an organization’s attack surface?

A.

An asset discovered through registration information attributed to the organization

B.

An asset attributed to the organization because the name server domain contains the company domain

C.

An asset attributed to the organization because the Subject Organization field contains the company name

D.

An asset manually approved by a Cortex Xpanse analyst

In which two locations can mapping be configured for indicators? (Choose two.)

A.

Feed Integration settings

B.

Classification & Mapping tab

C.

STIX parser code

D.

Indicator Configuration in Object Setup

Which type of analytics will trigger the alert on the image shown?

A.

Contextual

B.

Baseline

C.

Behavioral

D.

Anomaly

A Cortex XSIAM analyst in a SOC is reviewing an incident involving a workstation showing signs of a potential breach. The incident includes an alert from Cortex XDR Analytics Alert source "Remote service command execution from an uncommon source." As part of the incident handling process, the analyst must apply response actions to contain the threat effectively.

Which initial Cortex XDR agent response action should be taken to reduce attacker mobility on the network?

A.

Isolate Endpoint: Prevent the endpoint from communicating with the network

B.

Remove Malicious File: Delete the malicious file detected

C.

Terminate Process: Stop the suspicious processes identified

D.

Block IP Address: Prevent future connections to the IP from the workstation

Which pane in the User Risk View will identify the country from which a user regularly logs in, based on the past few weeks of data?

A.

Login Attempts

B.

Common Locations

C.

Actual Activity

D.

Latest Authentication Attempts

Why would an analyst schedule an XQL query?

A.

To trigger endpoint isolation action

B.

To retrieve data either at specific intervals or at a specified time

C.

To auto-resolve a false positive alert

D.

To increase accuracy of queries during off-peak load times

While investigating an incident on the Incident Overview page, an analyst notices that the playbook encountered an error. Upon playbook work plan review, it is determined that the error was caused by a timeout. However, the analyst does not have the necessary permissions to fix or create a new playbook.

Given the critical nature of the incident, what can the analyst do to ensure the playbook continues executing the remaining steps?

A.

Clone the playbook, remove the faulty step and run the new playbook to bypass the error

B.

Contact TAC to resolve the task error, as the playbook cannot proceed without it

C.

Navigate to the step where the error occurred and run the task again

D.

Pause the step with the error, thus automatically triggering the execution of the remaining steps.

In addition to defining the Rule Name and Severity Level, which step or set of steps accurately reflects how an analyst should configure an indicator prevention rule before reviewing and saving it?

A.

Filter and select file, IP address, and domain indicators.

B.

Select profiles for prevention

C.

Filter and select one or more file, IP address, and domain indicators.

D.

Select profiles for prevention

E.

Filter and select one or more SHA256 and MD5 indicators

F.

Filter and select indicators of any type.