New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Paloalto Networks XDR-Analyst - Palo Alto Networks XDR Analyst

Page: 2 / 3
Total 91 questions

Which of the following represents a common sequence of cyber-attack tactics?

A.

Actions on the objective » Reconnaissance » Weaponization & Delivery » Exploitation » Installation » Command & Control

B.

Installation >> Reconnaissance » Weaponization & Delivery » Exploitation » Command & Control » Actions on the objective

C.

Reconnaissance » Weaponization & Delivery » Exploitation » Installation » Command & Control » Actions on the objective

D.

Reconnaissance >> Installation » Weaponization & Delivery » Exploitation » Command & Control » Actions on the objective

In the Cortex XDR console, from which two pages are you able to manually perform the agent upgrade action? (Choose two.)

A.

Asset Management

B.

Agent Installations

C.

Action Center

D.

Endpoint Administration

Which minimum Cortex XDR agent version is required for Kubernetes Cluster?

A.

Cortex XDR 6.1

B.

Cortex XDR 7.4

C.

Cortex XDR 7.5

D.

Cortex XDR 5.0

Which statement is true for Application Exploits and Kernel Exploits?

A.

The ultimate goal of any exploit is to reach the application.

B.

Kernel exploits are easier to prevent then application exploits.

C.

The ultimate goal of any exploit is to reach the kernel.

D.

Application exploits leverage kernel vulnerability.

Which of the following policy exceptions applies to the following description?

‘An exception allowing specific PHP files’

A.

Support exception

B.

Local file threat examination exception

C.

Behavioral threat protection rule exception

D.

Process exception

What is the Wildfire analysis file size limit for Windows PE files?

A.

No Limit

B.

500MB

C.

100MB

D.

1GB

Which search methods is supported by File Search and Destroy?

A.

File Seek and Destroy

B.

File Search and Destroy

C.

File Seek and Repair

D.

File Search and Repair

Which Exploit Protection Module (EPM) can be used to prevent attacks based on OS function?

A.

UASLR

B.

JIT Mitigation

C.

Memory Limit Heap Spray Check

D.

DLL Security

How does Cortex XDR agent for Windows prevent ransomware attacks from compromising the file system?

A.

by encrypting the disk first.

B.

by utilizing decoy Files.

C.

by retrieving the encryption key.

D.

by patching vulnerable applications.

Under which conditions is Local Analysis evoked to evaluate a file before the file is allowed to run?

A.

The endpoint is disconnected or the verdict from WildFire is of a type benign.

B.

The endpoint is disconnected or the verdict from WildFire is of a type unknown.

C.

The endpoint is disconnected or the verdict from WildFire is of a type malware.

D.

The endpoint is disconnected or the verdict from WildFire is of a type grayware.