Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Paloalto Networks XSIAM-Analyst - Palo Alto Networks XSIAM Analyst

Page: 1 / 2
Total 50 questions

In which two locations can mapping be configured for indicators? (Choose two.)

A.

Feed Integration settings

B.

Classification & Mapping tab

C.

STIX parser code

D.

Indicator Configuration in Object Setup

Why would an analyst schedule an XQL query?

A.

To trigger endpoint isolation action

B.

To retrieve data either at specific intervals or at a specified time

C.

To auto-resolve a false positive alert

D.

To increase accuracy of queries during off-peak load times

A Cortex XSIAM analyst in a SOC is reviewing an incident involving a workstation showing signs of a potential breach. The incident includes an alert from Cortex XDR Analytics Alert source "Remote service command execution from an uncommon source." As part of the incident handling process, the analyst must apply response actions to contain the threat effectively.

Which initial Cortex XDR agent response action should be taken to reduce attacker mobility on the network?

A.

Isolate Endpoint: Prevent the endpoint from communicating with the network

B.

Remove Malicious File: Delete the malicious file detected

C.

Terminate Process: Stop the suspicious processes identified

D.

Block IP Address: Prevent future connections to the IP from the workstation

A Cortex XSIAM analyst is investigating a security incident involving a workstation after having deployed a Cortex XDR agent for 45 days. The incident details include the Cortex XDR Analytics Alert "Uncommon remote scheduled task creation." Which response will mitigate the threat?

A.

Initiate the endpoint isolate action to contain the threat.

B.

Revoke user access and conduct a user audit

C.

Prioritize blocking the source IP address to prevent further login attempts.

D.

Allow list the processes to reduce alert noise.

SCENARIO:

A security analyst has been assigned a ticket from the help desk stating that users are experiencing errors when attempting to open files on a specific network share. These errors state that the file format cannot be opened. IT has verified that the file server is online and functioning, but that all files have unusual extensions attached to them.

The security analyst reviews alerts within Cortex XSIAM and identifies malicious activity related to a possible ransomware attack on the file server. This incident is then escalated to the incident response team for further investigation.

Upon reviewing the incident, the responders confirm that ransomware was successfully executed on the file server. Other details of the attack are noted below:

• An unpatched vulnerability on an externally facing web server was exploited for initial access

• The attackers successfully used Mimikatz to dump sensitive credentials that were used for privilege escalation

• PowerShell was used on a Windows server for additional discovery, as well as lateral movement to other systems

• The attackers executed SystemBC RAT on multiple systems to maintain remote access

• Ransomware payload was downloaded on the file server via an external site "file io"

QUESTION STATEMENT:

The incident responders are attempting to determine why Mimikatz was able to successfully run during the attack.

Which exploit protection profile in Cortex XSIAM should be reviewed to ensure it is configured with an Action Mode of Block?

A.

Logical Exploits Protection

B.

Browser Exploits Protection

C.

Known Vulnerable Process Protection

D.

Operating System Exploit Protection

An analyst conducting a threat hunt needs to collect multiple files from various endpoints. The analyst begins the file retrieval process by using the Action Center, but upon review of the retrieved files, notices that the list is incomplete and missing files, including kernel files.

What could be the reason for the issue?

A.

The file retrieval policy applied to the endpoints may restrict access to certain system or kernel files

B.

The retrieval process is limited to 500 MB in total file size

C.

The endpoint agents were in offline mode during the file retrieval process, causing some files to be skipped

D.

The analyst must manually retrieve kernel files by accessing the machine directly

Which two actions will allow a security analyst to review updated commands from the core pack and interpret the results without altering the incident audit? (Choose two)

A.

Run the core commands directly from the playground and invite other collaborators.

B.

Run the core commands directly from the Command and Scripts menu inside playground

C.

Create a playbook with the commands and run it from within the War Room

D.

Run the core commands directly by typing them into the playground CLI.

Which feature terminates a process during an investigation?

A.

Response Center

B.

Live Terminal

C.

Exclusion

D.

Restriction

Which query will hunt for only incoming traffic from 99.99.99.99 when all log sources have been mapped to XDM?

A.

datamodel preset = * | filter XDM.ALIAS.ip = "99.99.99.99"

B.

datamodel dataset = * filter XDM.ALIAS.ipv4 = "99.99.99.99"

C.

datamodel dataset = * | fields fieldset.xdm_network | filter xdm.source.ipv4 = "99.99.99.99"

D.

preset = network_story | filter agent_ip_addresses = "99.99.99.99"

SCENARIO:

A security analyst has been assigned a ticket from the help desk stating that users are experiencing errors when attempting to open files on a specific network share. These errors state that the file format cannot be opened. IT has verified that the file server is online and functioning, but that all files have unusual extensions attached to them.

The security analyst reviews alerts within Cortex XSIAM and identifies malicious activity related to a possible ransomware attack on the file server. This incident is then escalated to the incident response team for further investigation.

Upon reviewing the incident, the responders confirm that ransomware was successfully executed on the file server. Other details of the attack are noted below:

• An unpatched vulnerability on an externally facing web server was exploited for initial access

• The attackers successfully used Mimikatz to dump sensitive credentials that were used for privilege escalation

• PowerShell was used on a Windows server for additional discovery, as well as lateral movement to other systems

• The attackers executed SystemBC RAT on multiple systems to maintain remote access

• Ransomware payload was downloaded on the file server via an external site "file io"

QUESTION STATEMENT:

Which hunt collection category in Cortex XSIAM should the incident responders use to identify all systems where the attackers established persistence during the attack?

A.

Remote Access

B.

Network Data

C.

Process Execution

D.

Command History