Month End Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Paloalto Networks PSE-Cortex Dumps

Page: 1 / 17
Total 168 questions

Palo Alto Networks System Engineer - Cortex Professional Questions and Answers

Question 1

Given the exception thrown in the accompanying image by the Demisto REST API integration, which action would most likely solve the problem?

as

Which two playbook functionalities allow looping through a group of tasks during playbook execution? (Choose two.)

Options:

A.

Generic Polling Automation Playbook

B.

Playbook Tasks

C.

Sub-Play books

D.

Playbook Functions

Question 2

Which Cortex XDR license is required for a customer that requests endpoint detection and response (EDR) data collection capabilities?

Options:

A.

Cortex XDR Pro per TB

B.

Cortex XDR Endpoint

C.

Cortex XDR Prevent

D.

Cortex XDR Pro Per Endpoint

Question 3

Where is the best place to find official resource material?

Options:

A.

Online forums

B.

Video series

C.

Administrator's guide

D.

Technical blogs

Question 4

Which command is used to add Cortex XSOAR "User1" to an investigation from the War Room command-line interface (CLI)?

Options:

A.

/invite User1

B.

#User1

C.

@User1

D.

!invite User1

Question 5

Which integration allows data to be pushed from Cortex XSOAR into Splunk?

Options:

A.

ArcSight ESM integration

B.

SplunkUpdate integration

C.

Demisto App for Splunk integration

D.

SplunkPY integration

Question 6

How does a clear understanding of a customer’s technical expertise assist in a hand off following the close of an opportunity?

Options:

A.

It enables customers to prepare for audits so they can demonstrate compliance.

B.

It helps in assigning additional technical tasks to the customer

C.

It allows implementation teams to bypass initial scoping exercises

D.

It enables post-sales teams to tailor their support and training appropriately

Question 7

The images show two versions of the same automation script and the results they produce when executed in Demisto. What are two possible causes of the exception thrown in the second Image? (Choose two.)

SUCCESS

as

Options:

A.

The modified scnpt was run in the wrong Docker image

B.

The modified script required a different parameter to run successfully.

C.

The dictionary was defined incorrectly in the second script.

D.

The modified script attempted to access a dictionary key that did not exist in the dictionary named "data”

Question 8

What is a key difference between audit users and full users in Cortex XSOAR?

Options:

A.

Audit users can only view incidents, while full users can edit system components.

B.

Full users can only view dashboards, while audit users can investigate incidents.

C.

Audit users have read-only permission, white full users have read-write permission.

D.

Audit users can run scripts and playbooks, while full users can only view reports.

Question 9

A customer has 2700 endpoints. There is currently concern about recent attacks in their industry and threat intelligence from a third-party subscription. In an attempt to be proactive, phishing simulations have been prioritized, but the customer wants to gain more visibility and remediation capabilities specific to their network traffic.

Which Cortex product provides these capabilities?

Options:

Question 10

Which Cortex XDR Agent capability prevents loading malicious files from USB-connected removable equipment?

Options:

A.

Agent Configuration

B.

Device Control

C.

Device Customization

D.

Agent Management

Question 11

Which solution profiles network behavior metadata, not payloads and files, allowing effective operation regardless of encrypted or unencrypted communication protocols, like HTTPS?

Options:

A.

endpoint protection platform (EPP)

B.

Security Information and Event Management (SIEM)

C.

endpoint detection and response (EDR)

D.

Network Detection and Response (NDR)

Question 12

Which two items are stitched to the Cortex XDR causality chain'' (Choose two)

Options:

A.

firewall alert

B.

SIEM alert

C.

full URL

D.

registry set value

Question 13

What are two capabilities of a War Room? (Choose two.)

Options:

A.

create widgets for an investigation

B.

create playbooks for orchestration

C.

act as an audit trail for an investigation

D.

run ad-hoc automation commands

Question 14

What method does the Traps agent use to identify malware during a scheduled scan?

Options:

A.

Heuristic analysis

B.

Local analysis

C.

Signature comparison

D.

WildFire hash comparison and dynamic analysis

Question 15

A customer wants the main Cortex XSOAR server installed in one site and wants to integrate with three other technologies in a second site.

What communications are required between the two sites if the customer wants to install a Cortex XSOAR engine in the second site?

Options:

A.

The Cortex XSOAR server at the first site must be able to initiate a connection to the Cortex XSOAR engine at the second site.

B.

All connectivity is initiated from the Cortex XSOAR server on the first site via a managed cloud proxy.

C.

Dedicated site-to-site virtual private network (VPN) is required for the Cortex XSOAR server at the first site to initiate a connection to the Cortex XSOAR engine at the second site.

D.

The Cortex XSOAR engine at the first site must be able to initiate a connection to the Cortex XSOAR server at the second site.

Question 16

Given the integration configuration and error in the screenshot what is the cause of the problem?

as

Options:

A.

incorrect instance name

B.

incorrect Username and Password

C.

incorrect appliance port

D.

incorrect server URL

Question 17

What is the difference between the intel feed’s license quotas of Cortex XSOAR Starter Edition and Cortex XSOAR (SOAR + TIM)?

Options:

A.

Cortex XSOAR Started Edition has unlimited access to the Threat Intel Library.

B.

In Cortex XSOAR (SOAR + TIM), Unit 42 Intelligence is not included.

C.

In Cortex XSOAR (SOAR + TIM), intelligence detail view and relationships data are not included.

D.

Cortex XSOAR Starter Edition includes up to 5 active feeds and 100 indicators/fetch.

Question 18

Which product enables the discovery, exchange, and contribution of security automation playbooks, built into Cortex XSOAR?

Options:

A.

XSOAR Threat Intelligence Platform (TIP)

B.

XSOAR Automated Systems

C.

XSOAR Ticketing Systems

D.

XSOAR Marketplace

Question 19

An EDR project was initiated by a CISO. Which resource will likely have the most heavy influence on the project?

Options:

A.

desktop engineer

B.

SOC manager

C.

SOC analyst IT

D.

operations manager

Question 20

The certificate used for decryption was installed as a trusted root CA certificate to ensure communication between the Cortex XDR Agent and Cortex XDR Management Console What action needs to be taken if the administrator determines the Cortex XDR Agents are not communicating with the Cortex XDR Management Console?

Options:

A.

add paloaltonetworks com to the SSL Decryption Exclusion list

B.

enable SSL decryption

C.

disable SSL decryption

D.

reinstall the root CA certificate

Question 21

Which two statements apply to widgets? (Choose two.)

Options:

A.

All widgets are customizable.

B.

Dashboards cannot be shared across an organization.

C.

A widget can have its own time range that is different from the rest of the dashboard.

D.

Some widgets cannot be changed

Question 22

How does Cortex XSOAR automation save time when a phishing incident occurs?

Options:

A.

By developing an integration.

B.

By responding to management with risk scores

C.

By purging unopened phishing email from user mailboxes

D.

By emailing staff to inform them of phishing attack in advance

Question 23

Which process in the causality chain does the Cortex XDR agent identify as triggering an event sequence?

Options:

A.

the relevant shell

B.

The causality group owner

C.

the adversary's remote process

D.

the chain's alert initiator

Question 24

A customer has purchased Cortex Data Lake storage with the following configuration, which requires 2 TB of Cortex Data Lake to order:

support for 300 total Cortex XDR clients all forwarding Cortex XDR data with 30-day retention

storage for higher fidelity logs to support Cortex XDR advanced analytics

The customer now needs 1000 total Cortex XDR clients, but continues with 300 clients forwarding Cortex XDR data with 30-day retention.

What is the new total storage requirement for Cortex Data Lake storage to order?

Options:

A.

16 TB

B.

4 TB

C.

8 TB

D.

2 TB

Question 25

Which element displays an entire picture of an attack, including the root cause or delivery point?

Options:

A.

Cortex XSOAR Work Plan

B.

Cortex SOC Orchestrator

C.

Cortex Data Lake

D.

Cortex XDR Causality View

Question 26

When preparing the golden image in a Cortex XDR Virtual Desktop Infrastructure (VDI) deployment, which step is required?

Options:

A.

Disable automatic memory dumps.

B.

Scan the image using the imagepreptool.

C.

Launch the VDI conversion tool.

D.

Enable the VDI license timeout.

Question 27

Which two entities can be created as a BIOC? (Choose two.)

Options:

A.

file

B.

registry

C.

event log

D.

alert log

Question 28

When preparing for a Cortex XSOAR proof of value (POV), which task should be performed before the evaluation is requested?

Options:

A.

Ensuring that the customer has single sign-on (SSO) configured in their environment

B.

Building out an executive-IeveI proposal detailing the product capabilities

C.

Planning for every different use case the customer has for the solution

D.

Gathering a list of the different integrations that will need to be configured

Question 29

Which two entities can be created as a behavioral indicator of compromise (BIOC)? (Choose two.)

Options:

A.

process

B.

data

C.

event alert

D.

network

Question 30

Which two types of indicators of compromise (IOCs) are available for creation in Cortex XDR? (Choose two.)

Options:

A.

registry

B.

file path

C.

hash

D.

hostname

Question 31

Which two Cortex XSOAR incident type features can be customized under Settings > Advanced > Incident Types? (Choose two.)

Options:

A.

adding new fields to an incident type

B.

setting reminders for an incident service level agreement

C.

defining whether a playbook runs automatically when an incident type is encountered

D.

dropping new incidents of the same type that contain similar information

Question 32

Which integration allows searching and displaying Splunk results within Cortex XSOAR?

Options:

A.

SplunkPY integration

B.

Demisto App for Splunk integration

C.

XSOAR REST API integration

D.

Splunk integration

Question 33

Which deployment type supports installation of an engine on Windows, Mac OS. and Linux?

Options:

A.

RPM

B.

SH

C.

DEB

D.

ZIP

Question 34

An Administrator is alerted to a Suspicious Process Creation security event from multiple users.

The users believe that these events are false positives Which two steps should the administrator take to confirm the false positives and create an exception? (Choose two )

Options:

A.

With the Malware Security profile, disable the "Prevent Malicious Child Process Execution" module

B.

Within the Malware Security profile add the specific parent process, child process, and command line argument to the child process whitelist

C.

In the Cortex XDR security event, review the specific parent process, child process, and command line arguments

D.

Contact support and ask for a security exception.

Question 35

Which command-line interface (CLI) query would retrieve the last three Splunk events?

Options:

A.

!search using=splunk_instance_1 query="* | last 3"

B.

!search using=splunk_instance_1 query="* | 3"

C.

!query using=splunk_instance_1 query="* | last 3"

D.

!search using=splunk_instance_1 query="* | head 3"

Question 36

An adversary attempts to communicate with malware running on a network in order to control malware activities or to exfiltrate data from the network.

Which Cortex XDR Analytics alert will this activity most likely trigger?

Options:

A.

uncommon local scheduled task creation

B.

malware

C.

new administrative behavior

D.

DNS Tunneling

Question 37

If a customer activates a TMS tenant and has not purchased a Cortex Data Lake instance.

Palo Alto Networks will provide the customer with a free instance

What size is this free Cortex Data Lake instance?

Options:

A.

1 TB

B.

10 GB

C.

100 GB

D.

10 TB

Question 38

What must a customer deploy prior to collecting endpoint data in Cortex XSIAM?

Options:

A.

Playbook

B.

Broker VM

C.

XDR agent

D.

External dynamic list

Question 39

Which consideration should be taken into account before deploying Cortex XSOAR?

Options:

A.

Which cybersecurity framework to implement for Secure Operations Center (SOC) operations

B.

Whether communication with internal or external applications is required

C.

How to configure network firewalls for optimal performance

D.

Which endpoint protection software to integrate with Cortex XSOAR

Question 40

An existing Palo Alto Networks SASE customer expresses that their security operations practice is having difficulty using the SASE data to help detect threats in their environment. They understand that parts of the Cortex portfolio could potentially help them and have reached out for guidance on moving forward.

Which two Cortex products are good recommendation for this customer? (Choose two.)

Options:

A.

Cortex XSOAR

B.

Cortex XDR

C.

Cortex

D.

Cortex XSIAM

Question 41

What is the size of the free Cortex Data Lake instance provided to a customer who has activated a TMS tenant, but has not purchased a Cortex Data Lake instance?

Options:

A.

10 GB

B.

1 TB

C.

10 TB

D.

100 GB

Question 42

Why is reputation scoring important in the Threat Intelligence Module of Cortex XSOAR?

Options:

A.

It allows for easy comparison between open-source intelligence and paid services.

B.

It deconflicts prioritization when two vendors give different scores for the same indicator.

C.

It provides a mathematical model for combining scores from multiple vendors.

D.

It helps identify threat intelligence vendors with substandard content.

Question 43

The certificate used for decryption was installed as a trusted toot CA certificate to ensure communication between the Cortex XDR Agent and Cortex XDR Management Console. What action needs to be taken if the administrator determines the Cortex XDR Agents are not communicating with the Cortex XDR Management Console?

Options:

A.

add paloaltonetworks.com to the SSL Decryption Exclusion list

B.

enable SSL decryption

C.

disable SSL decryption

D.

reinstall the root CA certificate

Question 44

A prospective customer is interested in Cortex XDR but is enable to run a product evaluation.

Which tool can be used instead to showcase Cortex XDR?

Options:

A.

Test Flight

B.

War Game

C.

Tech Rehearsal

D.

Capture the Flag

Question 45

Which three Demisto incident type features can be customized under Settings > Advanced > Incident Types? (Choose three.)

Options:

A.

Define whether a playbook runs automatically when an incident type is encountered

B.

Set reminders for an incident SLA

C.

Add new fields to an incident type

D.

Define the way that incidents of a specific type are displayed in the system

E.

Drop new incidents of the same type that contain similar information

Question 46

Which statement applies to the differentiation of Cortex XDR from security information and event management (SIEM)?

Options:

A.

SIEM has access to raw logs from agents, where Cortex XDR traditionally only gets alerts.

B.

Cortex XDR allows just logging into the console and out of the box the events were blocked as a proactive approach.

C.

Cortex XDR requires a large and diverse team of analysts and up to several weeks for simple actions like creating an alert.

D.

SIEM has been entirely designed and built as cloud-native, with the ability to stitch together cloud logs, on-premises logs, third-party logs, and endpoint logs.

Question 47

Which two areas of Cortex XDR are used for threat hunting activities? (Choose two.)

Options:

A.

indicators of compromise (IOC) rules

B.

query builder

C.

live terminal

D.

host insights module

Question 48

How does the integration between Cortex Xpanse and Cortex XSOAR benefit security teams?

Options:

A.

By enhancing firewall rule management

B.

By enabling automatic incident response actions for internet-based incidents

C.

By providing real-time threat intelligence feeds

D.

By automating endpoint detection and response (EDR) processes

Question 49

Which feature of Cortex Xpanse allows it to identify previously unknown assets?

Options:

A.

Dynamic asset registration

B.

Scheduled network scanning

C.

Continuous internet scanning

D.

Active directory enumeration

Question 50

Which two types of lOCs are available for creation in Cortex XDR? (Choose two.)

Options:

A.

IP

B.

endpoint hostname

C.

domain

D.

registry entry

Page: 1 / 17
Total 168 questions