Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

XDR-Engineer Exam Dumps - Palo Alto Networks XDR Engineer

Go to page:
Question # 9

What is the earliest time frame an alert could be automatically generated once the conditions of a new correlation rule are met?

A.

Between 30 and 45 minutes

B.

Immediately

C.

5 minutes or less

D.

Between 10 and 20 minutes

Full Access
Question # 10

Based on the SBAC scenario image below, when the tenant is switched to permissive mode, which endpoint(s) data will be accessible?

A.

E1 only

B.

E2 only

C.

E1, E2, and E3

D.

E1, E2, E3, and E4

Full Access
Question # 11

Using the Cortex XDR console, how can additional network access be allowed from a set of IP addresses to an isolated endpoint?

A.

Add entries in Configuration section of Security Settings

B.

Add entries in the Allowed Domains section of Security Settings for the tenant

C.

Add entries in Exceptions Configuration section of Isolation Exceptions

D.

Add entries in Response Actions section of Agent Settings profile

Full Access
Question # 12

How long is data kept in the temporary hot storage cache after being queried from cold storage?

A.

1 hour, re-queried to a maximum of 12 hours

B.

24 hours, re-queried to a maximum of 7 days

C.

24 hours, re-queried to a maximum of 14 days

D.

1 hour, re-queried to a maximum of 24 hours

Full Access
Question # 13

An analyst considers an alert with the category of lateral movement to be allowed and not needing to be checked in the future. Based on the image below, which action can an engineer take to address the requirement?

A.

Create a behavioral indicator of compromise (BIOC) suppression rule for the parent process and the specific BIOC: Lateral movement

B.

Create an alert exclusion rule by using the alert source and alert name

C.

Create a disable injection and prevention rule for the parent process indicated in the alert

D.

Create an exception rule for the parent process and the exact command indicated in the alert

Full Access
Question # 14

A correlation rule is created to detect potential insider threats by correlating user login events from one dataset with file access events from another dataset. The rule must retain all user login events, even if there are no matching file access events, to ensure no login activity is missed.

text

Copy

dataset = x

| join (dataset = y)

Which type of join is required to maintain all records from dataset x, even if there are no matching events from dataset y?

A.

Inner

B.

Left

C.

Right

D.

Outer

Full Access
Question # 15

What will enable a custom prevention rule to block specific behavior?

A.

A correlation rule added to an Agent Blocking profile

B.

A custom behavioral indicator of compromise (BIOC) added to an Exploit profile

C.

A custom behavioral indicator of compromise (BIOC) added to a Restriction profile

D.

A correlation rule added to a Malware profile

Full Access
Go to page: