Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Paloalto Networks Security Operations XDR-Engineer Questions and answers with ValidTests

Exam XDR-Engineer All Questions
Exam XDR-Engineer Premium Access

View all detail and faqs for the XDR-Engineer exam

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

What will enable a custom prevention rule to block specific behavior?

Options:

A.

A correlation rule added to an Agent Blocking profile

B.

A custom behavioral indicator of compromise (BIOC) added to an Exploit profile

C.

A custom behavioral indicator of compromise (BIOC) added to a Restriction profile

D.

A correlation rule added to a Malware profile

Expert Solution
Questions # 2:

In addition to using valid authentication credentials, what is required to enable the setup of the Database Collector applet on the Broker VM to ingest database activity?

Options:

A.

Valid SQL query targeting the desired data

B.

Access to the database audit log

C.

Database schema exported in the correct format

D.

Access to the database transaction log

Expert Solution
Questions # 3:

Which XQL query can be saved as a behavioral indicator of compromise (BIOC) rule, then converted to a custom prevention rule?

Options:

A.

dataset = xdr_data

| filter event_type = ENUM.DEVICE and action_process_image_name = "**"

and action_process_image_command_line = "-e cmd*"

and action_process_image_command_line != "*cmd.exe -a /c*"

B.

dataset = xdr_data

| filter event_type = ENUM.PROCESS and event_type = ENUM.DEVICE and action_process_image_name = "**"

and action_process_image_command_line = "-e cmd*"

and action_process_image_command_line != "*cmd.exe -a /c*"

C.

dataset = xdr_data

| filter event_type = FILE and (event_sub_type = FILE_CREATE_NEW or event_sub_type = FILE_WRITE or event_sub_type = FILE_REMOVE or event_sub_type = FILE_RENAME) and agent_hostname = "hostname"

| filter lowercase(action_file_path) in ("/etc/*", "/usr/local/share/*", "/usr/share/*") and action_file_extension in ("conf", "txt")

| fields action_file_name, action_file_path, action_file_type, agent_ip_a

D.

dataset = xdr_data

| filter event_type = ENUM.PROCESS and action_process_image_name = "**"

and action_process_image_command_line = "-e cmd*"

and action_process_image_command_line != "*cmd.exe -a /c*"

Expert Solution
Questions # 4:

During a recent internal purple team exercise, the following recommendation is given to the detection engineering team: Detect and prevent command line invocation of Python on Windows endpoints by non-technical business units. Which rule type should be implemented?

Options:

A.

Analytics Behavioral Indicator of Compromise (ABIOC)

B.

Behavioral Indicator of Compromise (BIOC)

C.

Correlation

D.

Indicator of Compromise (IOC)

Expert Solution
Questions # 5:

When using Kerberos as the authentication method for Pathfinder, which two settings must be validated on the DNS server? (Choose two.)

Options:

A.

DNS forwarders

B.

Reverse DNS zone

C.

Reverse DNS records

D.

AD DS-integrated zones

Expert Solution
Questions # 6:

A security audit determines that the Windows Cortex XDR host-based firewall is not blocking outbound RDP connections for certain remote workers. The audit report confirms the following:

    All devices are running healthy Cortex XDR agents.

    A single host-based firewall rule to block all outbound RDP is implemented.

    The policy hosting the profile containing the rule applies to all Windows endpoints.

    The logic within the firewall rule is adequate.

    Further testing concludes RDP is successfully being blocked on all devices tested at company HQ.

    Network location configuration in Agent Settings is enabled on all Windows endpoints.What is the likely reason the RDP connections are not being blocked?

Options:

A.

The profile's default action for outbound traffic is set to Allow

B.

The pertinent host-based firewall rule group is only applied to external rule groups

C.

Report mode is set to Enabled in the report settings under the profile configuration

D.

The pertinent host-based firewall rule group is only applied to internal rule groups

Expert Solution
Questions # 7:

A static endpoint group is created by adding 321 endpoints using the Upload From File feature. However, after group creation, the members count field shows 244 endpoints. What are two possible reasons why endpoints were not added to the group? (Choose two.)

Options:

A.

Static groups have a limit of 250 endpoints when adding by file

B.

Endpoints added to the new group were previously added to an existing group

C.

Endpoints added to the group were in Disconnected or Connection Lost status when groupmembership was added

D.

The IP address, hostname, or alias of the endpoints must match an existing agent that has registered with the tenant

Expert Solution
Questions # 8:

Which two steps should be considered when configuring the Cortex XDR agent for a sensitive and highly regulated environment? (Choose two.)

Options:

A.

Enable critical environment versions

B.

Create an agent settings profile where the agent upgrade scope is maintenance releases only

C.

Create an agent settings profile, enable content auto-update, and include a delay of four days

D.

Enable minor content version updates

Expert Solution
Questions # 9:

How are dynamic endpoint groups created and managed in Cortex XDR?

Options:

A.

Endpoint groups require intervention to update the group with new endpoints when a new device is added to the network

B.

Each endpoint can belong to multiple groups simultaneously, allowing different security policies to be applied to the same device at the same time

C.

After an endpoint group is created, its assigned security policy cannot be changed without deleting and recreating the group

D.

Endpoint groups are defined based on fields such as OS type, OS version, and network segment

Expert Solution
Questions # 10:

What should be configured in Cortex XDR to integrate asset data from Microsoft Azure for better visibility and incident investigation?

Options:

A.

Azure Network Watcher

B.

Cloud Identity Engine

C.

Cloud Inventory

D.

Microsoft 365

Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions