New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

XDR-Analyst Palo Alto Networks XDR Analyst Questions and Answers

Questions 4

Why would one threaten to encrypt a hypervisor or, potentially, a multiple number of virtual machines running on a server?

Options:

A.

To extort a payment from a victim or potentially embarrass the owners.

B.

To gain notoriety and potentially a consulting position.

C.

To better understand the underlying virtual infrastructure.

D.

To potentially perform a Distributed Denial of Attack.

Buy Now
Questions 5

When creating a custom XQL query in a dashboard, how would a user save that XQL query to the Widget Library?

Options:

A.

Click the three dots on the widget and then choose “Save” and this will link the query to the Widget Library.

B.

This isn’t supported, you have to exit the dashboard and go into the Widget Library first to create it.

C.

Click on “Save to Action Center” in the dashboard and you will be prompted to give the query a name and description.

D.

Click on “Save to Widget Library” in the dashboard and you will be prompted to give the query a name and description.

Buy Now
Questions 6

When selecting multiple Incidents at a time, what options are available from the menu when a user right-clicks the incidents? (Choose two.)

Options:

A.

Assign incidents to an analyst in bulk.

B.

Change the status of multiple incidents.

C.

Investigate several Incidents at once.

D.

Delete the selected Incidents.

Buy Now
Questions 7

To stop a network-based attack, any interference with a portion of the attack pattern is enough to prevent it from succeeding. Which statement is correct regarding the Cortex XDR Analytics module?

Options:

A.

It does not interfere with any portion of the pattern on the endpoint.

B.

It interferes with the pattern as soon as it is observed by the firewall.

C.

It does not need to interfere with the any portion of the pattern to prevent the attack.

D.

It interferes with the pattern as soon as it is observed on the endpoint.

Buy Now
Questions 8

What should you do to automatically convert leads into alerts after investigating a lead?

Options:

A.

Lead threats can't be prevented in the future because they already exist in the environment.

B.

Create IOC rules based on the set of the collected attribute-value pairs over the affected entities concluded during the lead hunting.

C.

Create BIOC rules based on the set of the collected attribute-value pairs over the affected entities concluded during the lead hunting.

D.

Build a search query using Query Builder or XQL using a list of lOCs.

Buy Now
Questions 9

Where would you view the WildFire report in an incident?

Options:

A.

next to relevant Key Artifacts in the incidents details page

B.

under Response --> Action Center

C.

under the gear icon --> Agent Audit Logs

D.

on the HUB page at apps.paloaltonetworks.com

Buy Now
Questions 10

Which statement is correct based on the report output below?

XDR-Analyst Question 10

Options:

A.

Host Inventory Data Collection is enabled.

B.

3,297 total incidents have been detected.

C.

Forensic inventory data collection is enabled.

D.

133 agents have full disk encryption.

Buy Now
Questions 11

Which of the following paths will successfully activate Remediation Suggestions?

Options:

A.

Incident View > Actions > Remediation Suggestions

B.

Causality View > Actions > Remediation Suggestions

C.

Alerts Table > Right-click on a process node > Remediation Suggestions

D.

Alerts Table > Right-click on an alert > Remediation Suggestions

Buy Now
Questions 12

What contains a logical schema in an XQL query?

Options:

A.

Bin

B.

Array expand

C.

Field

D.

Dataset

Buy Now
Questions 13

Which of the following represents a common sequence of cyber-attack tactics?

Options:

A.

Actions on the objective » Reconnaissance » Weaponization & Delivery » Exploitation » Installation » Command & Control

B.

Installation >> Reconnaissance » Weaponization & Delivery » Exploitation » Command & Control » Actions on the objective

C.

Reconnaissance » Weaponization & Delivery » Exploitation » Installation » Command & Control » Actions on the objective

D.

Reconnaissance >> Installation » Weaponization & Delivery » Exploitation » Command & Control » Actions on the objective

Buy Now
Questions 14

As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to open a malicious Word document. You learn from the WildFire report and AutoFocus that this document is known to have been used in Phishing campaigns since 2018. What steps can you take to ensure that the same document is not opened by other users in your organization protected by the Cortex XDR agent?

Options:

A.

Enable DLL Protection on all endpoints but there might be some false positives.

B.

Create Behavioral Threat Protection (BTP) rules to recognize and prevent the activity.

C.

No step is required because Cortex shares IOCs with our fellow Cyber Threat Alliance members.

D.

No step is required because the malicious document is already stopped.

Buy Now
Questions 15

What is the action taken out by Managed Threat Hunting team for Zero Day Exploits?

Options:

A.

MTH researches for threats in the tenant and generates a report with the findings.

B.

MTH researches for threats in the logs and reports to engineering.

C.

MTH runs queries and investigative actions and no further action is taken.

D.

MTH pushes content updates to prevent against the zero-day exploits.

Buy Now
Questions 16

What is the outcome of creating and implementing an alert exclusion?

Options:

A.

The Cortex XDR agent will allow the process that was blocked to run on the endpoint.

B.

The Cortex XDR console will hide those alerts.

C.

The Cortex XDR agent will not create an alert for this event in the future.

D.

The Cortex XDR console will delete those alerts and block ingestion of them in the future.

Buy Now
Questions 17

When using the “File Search and Destroy” feature, which of the following search hash type is supported?

Options:

A.

SHA256 hash of the file

B.

AES256 hash of the file

C.

MD5 hash of the file

D.

SHA1 hash of the file

Buy Now
Questions 18

What does the following output tell us?

XDR-Analyst Question 18

Options:

A.

There is one low severity incident.

B.

Host shpapy_win10 had the most vulnerabilities.

C.

There is one informational severity alert.

D.

This is an actual output of the Top 10 hosts with the most malware.

Buy Now
Questions 19

Which of the following protection modules is checked first in the Cortex XDR Windows agent malware protection flow?

Options:

A.

Hash Verdict Determination

B.

Behavioral Threat Protection

C.

Restriction Policy

D.

Child Process Protection

Buy Now
Questions 20

While working the alerts involved in a Cortex XDR incident, an analyst has found that every alert in this incident requires an exclusion. What will the Cortex XDR console automatically do to this incident if all alerts contained have exclusions?

Options:

A.

mark the incident as Unresolved

B.

create a BIOC rule excluding this behavior

C.

create an exception to prevent future false positives

D.

mark the incident as Resolved – False Positive

Buy Now
Questions 21

Which type of IOC can you define in Cortex XDR?

Options:

A.

Destination IP Address

B.

Source IP Address

C.

Source port

D.

Destination IP Address: Destination

Buy Now
Questions 22

An attacker tries to load dynamic libraries on macOS from an unsecure location. Which Cortex XDR module can prevent this attack?

Options:

A.

DDL Security

B.

Hot Patch Protection

C.

Kernel Integrity Monitor (KIM)

D.

Dylib Hijacking

Buy Now
Questions 23

Which function describes the removal of a specific file from its location on a local or removable drive to a protected folder to prevent the file from being executed?

Options:

A.

Search & destroy

B.

Isolation

C.

Quarantine

D.

Flag for removal

Buy Now
Questions 24

Which of the following policy exceptions applies to the following description?

‘An exception allowing specific PHP files’

Options:

A.

Support exception

B.

Local file threat examination exception

C.

Behavioral threat protection rule exception

D.

Process exception

Buy Now
Questions 25

As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to download Cobalt Strike on one of your servers. Days later, you learn about a massive ongoing supply chain attack. Using Cortex XDR you recognize that your server was compromised by the attack and that Cortex XDR prevented it. What steps can you take to ensure that the same protection is extended to all your servers?

Options:

A.

Create Behavioral Threat Protection (BTP) rules to recognize and prevent the activity.

B.

Enable DLL Protection on all servers but there might be some false positives.

C.

Create IOCs of the malicious files you have found to prevent their execution.

D.

Enable Behavioral Threat Protection (BTP) with cytool to prevent the attack from spreading.

Buy Now
Questions 26

Under which conditions is Local Analysis evoked to evaluate a file before the file is allowed to run?

Options:

A.

The endpoint is disconnected or the verdict from WildFire is of a type benign.

B.

The endpoint is disconnected or the verdict from WildFire is of a type unknown.

C.

The endpoint is disconnected or the verdict from WildFire is of a type malware.

D.

The endpoint is disconnected or the verdict from WildFire is of a type grayware.

Buy Now
Questions 27

When viewing the incident directly, what is the “assigned to” field value of a new Incident that was just reported to Cortex?

Options:

A.

Pending

B.

It is blank

C.

Unassigned

D.

New

Buy Now
Exam Code: XDR-Analyst
Exam Name: Palo Alto Networks XDR Analyst
Last Update: Dec 14, 2025
Questions: 91

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99