Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

PSE-Cortex Exam Dumps - Palo Alto Networks System Engineer - Cortex Professional

Go to page:
Question # 17

Which two types of indicators of compromise (IOCs) are available for creation in Cortex XDR? (Choose two.)

A.

registry

B.

file path

C.

hash

D.

hostname

Full Access
Question # 18

Which Cortex XDR capability extends investigations to an endpoint?

A.

Log Stitching

B.

Causality Chain

C.

Sensors

D.

Live Terminal

Full Access
Question # 19

Which Cortex XDR capability prevents running malicious files from USB-connected removable equipment?

A.

Device customization

B.

Agent configuration

C.

Agent management

D.

Restrictions profile

Full Access
Question # 20

What method does the Traps agent use to identify malware during a scheduled scan?

A.

Heuristic analysis

B.

Local analysis

C.

Signature comparison

D.

WildFire hash comparison and dynamic analysis

Full Access
Question # 21

A Cortex XSOAR customer wants to send a survey to users asking them to input their manager's email for a training use case so the manager can receive status reports on the employee's training. However, the customer is concerned users will provide incorrect information to avoid sending status updates to their manager.

How can Cortex XSOAR most efficiently sanitize user input prior to using the responses in the playbook?

A.

Create a task that sends the survey responses to the analyst via email. If the responses are incorrect, the analyst fills out the correct response in the survey.

B.

Create a manual task to ask the analyst to validate the survey response in the platform.

C.

Create a sub-playbook and import a list of manager emails into XSOAR. Use a conditional task comparison to check if the response matches an email on the list. If no matches are found, loop the sub-playbook and send the survey back to the user until a match is found.

D.

Create a conditional task comparison to check if the response contains a valid email address.

Full Access
Question # 22

Which four types of Traps logs are stored within Cortex Data Lake?

A.

Threat, Config, System, Data

B.

Threat, Config, System, Analytic

C.

Threat, Monitor. System, Analytic

D.

Threat, Config, Authentication, Analytic

Full Access
Question # 23

Rearrange the steps into the correct order for modifying an incident layout.

Full Access
Question # 24

What is the recommended first step in planning a Cortex XDR deployment?

A.

Implement Cortex XDR across all endpoints without assessing architecture or assets

B.

Deploy agents across the entire environment for immediate protection.

C.

Deploy Cortex XDR on endpoints with the highest potential for attack.

D.

Conduct an assessment and identify critical assets and endpoint within the environment.

Full Access
Go to page: