XDR-Analyst Palo Alto Networks XDR Analyst Questions and Answers
Why would one threaten to encrypt a hypervisor or, potentially, a multiple number of virtual machines running on a server?
When creating a custom XQL query in a dashboard, how would a user save that XQL query to the Widget Library?
When selecting multiple Incidents at a time, what options are available from the menu when a user right-clicks the incidents? (Choose two.)
To stop a network-based attack, any interference with a portion of the attack pattern is enough to prevent it from succeeding. Which statement is correct regarding the Cortex XDR Analytics module?
What should you do to automatically convert leads into alerts after investigating a lead?
Which of the following paths will successfully activate Remediation Suggestions?
As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to open a malicious Word document. You learn from the WildFire report and AutoFocus that this document is known to have been used in Phishing campaigns since 2018. What steps can you take to ensure that the same document is not opened by other users in your organization protected by the Cortex XDR agent?
What is the action taken out by Managed Threat Hunting team for Zero Day Exploits?
When using the “File Search and Destroy” feature, which of the following search hash type is supported?
Which of the following protection modules is checked first in the Cortex XDR Windows agent malware protection flow?
While working the alerts involved in a Cortex XDR incident, an analyst has found that every alert in this incident requires an exclusion. What will the Cortex XDR console automatically do to this incident if all alerts contained have exclusions?
An attacker tries to load dynamic libraries on macOS from an unsecure location. Which Cortex XDR module can prevent this attack?
Which function describes the removal of a specific file from its location on a local or removable drive to a protected folder to prevent the file from being executed?
Which of the following policy exceptions applies to the following description?
‘An exception allowing specific PHP files’
As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to download Cobalt Strike on one of your servers. Days later, you learn about a massive ongoing supply chain attack. Using Cortex XDR you recognize that your server was compromised by the attack and that Cortex XDR prevented it. What steps can you take to ensure that the same protection is extended to all your servers?
Under which conditions is Local Analysis evoked to evaluate a file before the file is allowed to run?
When viewing the incident directly, what is the “assigned to” field value of a new Incident that was just reported to Cortex?

