Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Paloalto Networks PCDRA - Palo Alto Networks Certified Detection and Remediation Analyst

Page: 3 / 3
Total 91 questions

Which of the following represents a common sequence of cyber-attack tactics?

A.

Actions on the objective » Reconnaissance »Weaponization& Delivery » Exploitation » Installation » Command & Control

B.

Installation >> Reconnaissance »Weaponization& Delivery » Exploitation » Command & Control » Actions on the objective

C.

Reconnaissance »Weaponization& Delivery » Exploitation » Installation » Command & Control » Actions on the objective

D.

Reconnaissance >> Installation »Weaponization& Delivery » Exploitation » Command & Control » Actions on the objective

What is the difference between presets and datasets in XQL?

A.

A dataset is a Cortex data lake data source only; presets are built-in data source.

B.

A dataset is a built-in orthird-partysource; presets group XDR data fields.

C.

A dataset is a database; presets is a field.

D.

A dataset is a third-party data source; presets are built-in data source.

What is the purpose of the Unit 42 team?

A.

Unit 42 is responsible for automation and orchestration of products

B.

Unit 42 is responsible for the configuration optimization of the Cortex XDR server

C.

Unit 42 is responsible for threat research, malware analysis and threat hunting

D.

Unit 42 is responsible for the rapid deployment of Cortex XDR agents

You can star security events in which two ways? (Choose two.)

A.

Create an alert-starring configuration.

B.

Create an Incident-starring configuration.

C.

Manually star an alert.

D.

Manually star an Incident.

Which of the following is NOT a precanned script provided by Palo Alto Networks?

A.

delete_file

B.

quarantine_file

C.

process_kill_name

D.

list_directories

When creating a BIOC rule, which XQL query can be used?

A.

dataset = xdr_data

| filter event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

B.

dataset = xdr_data

| filter event_type = PROCESS and

event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

C.

dataset = xdr_data

| filter action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

| fields action_process_image

D.

dataset = xdr_data

| filter event_behavior = true

event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

Where would you go to add an exception to exclude a specific file hash from examination by the Malware profile for a Windows endpoint?

A.

Find the Malware profile attached to the endpoint, Under Portable Executable and DLL Examination add the hash to the allow list.

B.

From the rules menu select new exception, fill out the criteria, choose the scope to apply it to, hit save.

C.

Find the exceptions profile attached to the endpoint, under process exceptions select local analysis, paste the hash and save.

D.

In the Action Center, choose Allow list, select new action, select add to allow list, add your hash to the list, and apply it.