Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Paloalto Networks PCDRA - Palo Alto Networks Certified Detection and Remediation Analyst

Page: 1 / 3
Total 91 questions

Which Type of IOC can you define in Cortex XDR?

A.

destination port

B.

e-mail address

C.

full path

D.

App-ID

In Windows and macOS you need to prevent the Cortex XDR Agent from blocking execution of a file based on the digital signer. What is one way to add an exception for the singer?

A.

In the Restrictions Profile, add the file name and path to the Executable Files allow list.

B.

Create a new rule exception and use the singer as the characteristic.

C.

Add the signer to the allow list in the malware profile.

D.

Add the signer to the allow list under the action center page.

Which minimum Cortex XDR agent version is required for Kubernetes Cluster?

A.

Cortex XDR 6.1

B.

Cortex XDR 7.4

C.

Cortex XDR 7.5

D.

Cortex XDR 5.0

Which two types of exception profiles you can create in Cortex XDR? (Choose two.)

A.

exception profiles that apply to specific endpoints

B.

agent exception profiles that apply to specific endpoints

C.

global exception profiles that apply to all endpoints

D.

role-based profiles that apply to specific endpoints

What license would be required for ingesting external logs from various vendors?

A.

Cortex XDR Pro per Endpoint

B.

Cortex XDR Vendor Agnostic Pro

C.

Cortex XDR Pro per TB

D.

Cortex XDR Cloud per Host

Which statement is true for Application Exploits and Kernel Exploits?

A.

The ultimate goal of any exploit is to reach the application.

B.

Kernel exploits are easier to prevent then application exploits.

C.

The ultimate goal of any exploit is to reach the kernel.

D.

Application exploits leverage kernel vulnerability.

Why would one threaten to encrypt a hypervisor or, potentially, a multiple number of virtual machines running on a server?

A.

To extort a payment from a victim or potentially embarrass the owners.

B.

To gain notoriety and potentially a consulting position.

C.

To better understand the underlying virtual infrastructure.

D.

To potentially perform a Distributed Denial of Attack.

In the Cortex XDR console, from which two pages are you able to manually perform the agent upgrade action? (Choose two.)

A.

Asset Management

B.

Agent Installations

C.

Action Center

D.

Endpoint Administration

Which profiles can the user use to configure malware protection in the Cortex XDR console?

A.

Malware Protection profile

B.

Malware profile

C.

Malware Detection profile

D.

Anti-Malware profile

Which statement best describes how Behavioral Threat Protection (BTP) works?

A.

BTP injects into known vulnerable processes to detect malicious activity.

B.

BTP runs on the Cortex XDR and distributes behavioral signatures to all agents.

C.

BTP matches EDR data with rules provided by Cortex XDR.

D.

BTP uses machine Learning to recognize malicious activity even if it is not known.