Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Paloalto Networks XDR-Engineer - Palo Alto Networks XDR Engineer

Page: 1 / 2
Total 50 questions

Which components may be included in a Cortex XDR content update?

A.

Device control profiles, agent versions, and kernel support

B.

Behavioral Threat Protection (BTP) rules and local analysis logic

C.

Antivirus definitions and agent versions

D.

Firewall rules and antivirus definitions

How long is data kept in the temporary hot storage cache after being queried from cold storage?

A.

1 hour, re-queried to a maximum of 12 hours

B.

24 hours, re-queried to a maximum of 7 days

C.

24 hours, re-queried to a maximum of 14 days

D.

1 hour, re-queried to a maximum of 24 hours

An administrator wants to employ reusable rules within custom parsing rules to apply consistent log field extraction across multiple data sources. Which section of the parsing rule should the administrator use to define those reusable rules in Cortex XDR?

A.

RULE

B.

INGEST

C.

FILTER

D.

CONST

Which configuration profile option with an available built-in template can be applied to both Windows and Linux systems by using XDR Collector?

A.

Filebeat

B.

HTTP Collector template

C.

XDR Collector settings

D.

Winlogbeat

What will enable a custom prevention rule to block specific behavior?

A.

A correlation rule added to an Agent Blocking profile

B.

A custom behavioral indicator of compromise (BIOC) added to an Exploit profile

C.

A custom behavioral indicator of compromise (BIOC) added to a Restriction profile

D.

A correlation rule added to a Malware profile

An XDR engineer is creating a correlation rule to monitor login activity on specific systems. When the activity is identified, an alert is created. The alerts are being generated properly but are missing the username when viewed. How can the username information be included in the alerts?

A.

Select “Initial Access” in the MITRE ATT&CK mapping to include the username

B.

Update the query in the correlation rule to include the username field

C.

Add a mapping for the username field in the alert fields mapping

D.

Add a drill-down query to the alert which pulls the username field

What is the earliest time frame an alert could be automatically generated once the conditions of a new correlation rule are met?

A.

Between 30 and 45 minutes

B.

Immediately

C.

5 minutes or less

D.

Between 10 and 20 minutes

A query is created that will run weekly via API. After it is tested and ready, it is reviewed in the Query Center. Which available column should be checked to determine how many compute units will be used when the query is run?

A.

Query Status

B.

Compute Unit Usage

C.

Simulated Compute Units

D.

Compute Unit Quota

An insider compromise investigation has been requested to provide evidence of an unauthorized removable drive being mounted on a company laptop. Cortex XDR agent is installed with default prevention agent settings profile and default extension "Device Configuration" profile. Where can an engineer find the evidence?

A.

Check Host Inventory -> Mounts

B.

dataset = xdr_data | filter event_type = ENUM.MOUNT and event_sub_type = ENUM.MOUNT_DRIVE_MOUNT

C.

The requested data requires additional configuration to be captured

D.

preset = device_control

How can a Malware profile be configured to prevent a specific executable from being uploaded to the cloud?

A.

Disable on-demand file examination for the executable

B.

Set PE and DLL examination for the executable to report action mode

C.

Add the executable to the allow list for executions

D.

Create an exclusion rule for the executable