Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

XSIAM-Analyst Exam Dumps - Palo Alto Networks XSIAM Analyst

Go to page:
Question # 9

What information is provided in the timeline view of Cortex XSIAM?

A.

Detailed overview of behavior or activity that triggered an Analytics Alert, Analytics BIOC alert or correlation rule

B.

Graphic representation of an event Causality Instance (CI) with additional capabilities to enable further analysis

C.

Tab within an incident where analysts can collaborate and initiate further actions and automations

D.

Sequence of events, alerts, rules and other actions involved over the lifespan of an incident

Full Access
Question # 10

A Cortex XSIAM analyst is investigating a security incident involving a workstation after having deployed a Cortex XDR agent for 45 days. The incident details include the Cortex XDR Analytics Alert "Uncommon remote scheduled task creation." Which response will mitigate the threat?

A.

Initiate the endpoint isolate action to contain the threat.

B.

Revoke user access and conduct a user audit

C.

Prioritize blocking the source IP address to prevent further login attempts.

D.

Allow list the processes to reduce alert noise.

Full Access
Question # 11

During an investigation, an analyst runs the reputation script for an indicator that is listed as Suspicious. The new reputation results display in the War Room as Malicious; however, the indicator verdict does not change.

What is the cause of this behavior?

A.

The indicator has been excluded.

B.

The indicator exists as an IOC rule.

C.

The indicator is expired.

D.

The indicator verdict was manually set to Suspicious.

Full Access
Question # 12

Based on the artifact details in the image below, what can an analyst infer from the hexagon-shaped object with the exclamation mark (!) at the center?

A.

The WildFire verdict returned is "Low Confidence."

B.

The artifact verdict has changed from a previous state to "Malware."

C.

The malicious artifact was injected.

D.

The malware requires further analysis.

Full Access
Question # 13

An analyst conducting a threat hunt needs to collect multiple files from various endpoints. The analyst begins the file retrieval process by using the Action Center, but upon review of the retrieved files, notices that the list is incomplete and missing files, including kernel files.

What could be the reason for the issue?

A.

The file retrieval policy applied to the endpoints may restrict access to certain system or kernel files

B.

The retrieval process is limited to 500 MB in total file size

C.

The endpoint agents were in offline mode during the file retrieval process, causing some files to be skipped

D.

The analyst must manually retrieve kernel files by accessing the machine directly

Full Access
Question # 14

SCENARIO:

A security analyst has been assigned a ticket from the help desk stating that users are experiencing errors when attempting to open files on a specific network share. These errors state that the file format cannot be opened. IT has verified that the file server is online and functioning, but that all files have unusual extensions attached to them.

The security analyst reviews alerts within Cortex XSIAM and identifies malicious activity related to a possible ransomware attack on the file server. This incident is then escalated to the incident response team for further investigation.

Upon reviewing the incident, the responders confirm that ransomware was successfully executed on the file server. Other details of the attack are noted below:

• An unpatched vulnerability on an externally facing web server was exploited for initial access

• The attackers successfully used Mimikatz to dump sensitive credentials that were used for privilege escalation

• PowerShell was used on a Windows server for additional discovery, as well as lateral movement to other systems

• The attackers executed SystemBC RAT on multiple systems to maintain remote access

• Ransomware payload was downloaded on the file server via an external site "file io"

QUESTION STATEMENT:

Which forensics artifact collected by Cortex XSIAM will help the responders identify what the attackers were looking for during the discovery phase of the attack?

A.

PSReadline

B.

WordWheelQuery

C.

User access logging

D.

Shell history

Full Access
Question # 15

Which Cytool command will re-enable protection on an endpoint that has Cortex XDR agent protection paused?

A.

cytool security enable

B.

cytool runtime start

C.

cytool service start

D.

cytool protect enable

Full Access
Go to page: