Palo Alto Networks System Engineer - Cortex Professional Questions and Answers
Given the exception thrown in the accompanying image by the Demisto REST API integration, which action would most likely solve the problem?
Which two playbook functionalities allow looping through a group of tasks during playbook execution? (Choose two.)
Which Cortex XDR license is required for a customer that requests endpoint detection and response (EDR) data collection capabilities?
Where is the best place to find official resource material?
Which command is used to add Cortex XSOAR "User1" to an investigation from the War Room command-line interface (CLI)?
Which integration allows data to be pushed from Cortex XSOAR into Splunk?
How does a clear understanding of a customer’s technical expertise assist in a hand off following the close of an opportunity?
The images show two versions of the same automation script and the results they produce when executed in Demisto. What are two possible causes of the exception thrown in the second Image? (Choose two.)
SUCCESS
What is a key difference between audit users and full users in Cortex XSOAR?
A customer has 2700 endpoints. There is currently concern about recent attacks in their industry and threat intelligence from a third-party subscription. In an attempt to be proactive, phishing simulations have been prioritized, but the customer wants to gain more visibility and remediation capabilities specific to their network traffic.
Which Cortex product provides these capabilities?
Which Cortex XDR Agent capability prevents loading malicious files from USB-connected removable equipment?
Which solution profiles network behavior metadata, not payloads and files, allowing effective operation regardless of encrypted or unencrypted communication protocols, like HTTPS?
Which two items are stitched to the Cortex XDR causality chain'' (Choose two)
What are two capabilities of a War Room? (Choose two.)
What method does the Traps agent use to identify malware during a scheduled scan?
A customer wants the main Cortex XSOAR server installed in one site and wants to integrate with three other technologies in a second site.
What communications are required between the two sites if the customer wants to install a Cortex XSOAR engine in the second site?
Given the integration configuration and error in the screenshot what is the cause of the problem?
What is the difference between the intel feed’s license quotas of Cortex XSOAR Starter Edition and Cortex XSOAR (SOAR + TIM)?
Which product enables the discovery, exchange, and contribution of security automation playbooks, built into Cortex XSOAR?
An EDR project was initiated by a CISO. Which resource will likely have the most heavy influence on the project?
The certificate used for decryption was installed as a trusted root CA certificate to ensure communication between the Cortex XDR Agent and Cortex XDR Management Console What action needs to be taken if the administrator determines the Cortex XDR Agents are not communicating with the Cortex XDR Management Console?
Which two statements apply to widgets? (Choose two.)
How does Cortex XSOAR automation save time when a phishing incident occurs?
Which process in the causality chain does the Cortex XDR agent identify as triggering an event sequence?
A customer has purchased Cortex Data Lake storage with the following configuration, which requires 2 TB of Cortex Data Lake to order:
support for 300 total Cortex XDR clients all forwarding Cortex XDR data with 30-day retention
storage for higher fidelity logs to support Cortex XDR advanced analytics
The customer now needs 1000 total Cortex XDR clients, but continues with 300 clients forwarding Cortex XDR data with 30-day retention.
What is the new total storage requirement for Cortex Data Lake storage to order?
Which element displays an entire picture of an attack, including the root cause or delivery point?
When preparing the golden image in a Cortex XDR Virtual Desktop Infrastructure (VDI) deployment, which step is required?
Which two entities can be created as a BIOC? (Choose two.)
When preparing for a Cortex XSOAR proof of value (POV), which task should be performed before the evaluation is requested?
Which two entities can be created as a behavioral indicator of compromise (BIOC)? (Choose two.)
Which two types of indicators of compromise (IOCs) are available for creation in Cortex XDR? (Choose two.)
Which two Cortex XSOAR incident type features can be customized under Settings > Advanced > Incident Types? (Choose two.)
Which integration allows searching and displaying Splunk results within Cortex XSOAR?
Which deployment type supports installation of an engine on Windows, Mac OS. and Linux?
An Administrator is alerted to a Suspicious Process Creation security event from multiple users.
The users believe that these events are false positives Which two steps should the administrator take to confirm the false positives and create an exception? (Choose two )
Which command-line interface (CLI) query would retrieve the last three Splunk events?
An adversary attempts to communicate with malware running on a network in order to control malware activities or to exfiltrate data from the network.
Which Cortex XDR Analytics alert will this activity most likely trigger?
If a customer activates a TMS tenant and has not purchased a Cortex Data Lake instance.
Palo Alto Networks will provide the customer with a free instance
What size is this free Cortex Data Lake instance?
What must a customer deploy prior to collecting endpoint data in Cortex XSIAM?
Which consideration should be taken into account before deploying Cortex XSOAR?
An existing Palo Alto Networks SASE customer expresses that their security operations practice is having difficulty using the SASE data to help detect threats in their environment. They understand that parts of the Cortex portfolio could potentially help them and have reached out for guidance on moving forward.
Which two Cortex products are good recommendation for this customer? (Choose two.)
What is the size of the free Cortex Data Lake instance provided to a customer who has activated a TMS tenant, but has not purchased a Cortex Data Lake instance?
Why is reputation scoring important in the Threat Intelligence Module of Cortex XSOAR?
The certificate used for decryption was installed as a trusted toot CA certificate to ensure communication between the Cortex XDR Agent and Cortex XDR Management Console. What action needs to be taken if the administrator determines the Cortex XDR Agents are not communicating with the Cortex XDR Management Console?
A prospective customer is interested in Cortex XDR but is enable to run a product evaluation.
Which tool can be used instead to showcase Cortex XDR?
Which three Demisto incident type features can be customized under Settings > Advanced > Incident Types? (Choose three.)
Which statement applies to the differentiation of Cortex XDR from security information and event management (SIEM)?
Which two areas of Cortex XDR are used for threat hunting activities? (Choose two.)
How does the integration between Cortex Xpanse and Cortex XSOAR benefit security teams?
Which feature of Cortex Xpanse allows it to identify previously unknown assets?
Which two types of lOCs are available for creation in Cortex XDR? (Choose two.)