Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

PSE-Cortex Palo Alto Networks System Engineer - Cortex Professional Questions and Answers

Questions 4

What is the size of the free Cortex Data Lake instance provided to a customer who has activated a TMS tenant, but has not purchased a Cortex Data Lake instance?

Options:

A.

10 GB

B.

1 TB

C.

10 TB

D.

100 GB

Buy Now
Questions 5

A customer has purchased Cortex XDR and requires 24/7 monitoring of the platform. However, the customer only has staff available during business hours.

Which Palo Alto Networks offering would best meet this requirement?

Options:

A.

Security Orchestration, Automation and Response

B.

Security Information and Event Management

C.

Managed Detection and Response

D.

Network Detection and Response

Buy Now
Questions 6

Which aspect of Cortex Xpanse allows for visibility over remote workforce risks?

Options:

A.

The ability to identify customer assets on residential networks

B.

The use of a VPN connection to scan remote devices

C.

The deployment of a Cortex Xpanse aqent on the remote endpoint

D.

The presence of a portal for remote workers to use for posture checking

Buy Now
Questions 7

Which four types of Traps logs are stored within Cortex Data Lake?

Options:

A.

Threat, Config, System, Data

B.

Threat, Config, System, Analytic

C.

Threat, Monitor. System, Analytic

D.

Threat, Config, Authentication, Analytic

Buy Now
Questions 8

Which two methods does the Cortex XDR agent use to identify malware during a scheduled scan? (Choose two.)

Options:

A.

WildFire hash comparison

B.

heuristic analysis

C.

signature comparison

D.

dynamic analysis

Buy Now
Questions 9

Which method is used for third-party network data consumption?

Options:

A.

scripts library from the action center

B.

Open Database Connectivity (ODBC) connection to network device database

C.

Common Event Format (CEF) via broker Syslog module

D.

file reader to the /var/log/messages file on the device

Buy Now
Questions 10

Which element displays an entire picture of an attack, including the root cause or delivery point?

Options:

A.

Cortex XSOAR Work Plan

B.

Cortex SOC Orchestrator

C.

Cortex Data Lake

D.

Cortex XDR Causality View

Buy Now
Questions 11

How does a clear understanding of a customer’s technical expertise assist in a hand off following the close of an opportunity?

Options:

A.

It enables customers to prepare for audits so they can demonstrate compliance.

B.

It helps in assigning additional technical tasks to the customer

C.

It allows implementation teams to bypass initial scoping exercises

D.

It enables post-sales teams to tailor their support and training appropriately

Buy Now
Questions 12

What is a key difference between audit users and full users in Cortex XSOAR?

Options:

A.

Audit users can only view incidents, while full users can edit system components.

B.

Full users can only view dashboards, while audit users can investigate incidents.

C.

Audit users have read-only permission, white full users have read-write permission.

D.

Audit users can run scripts and playbooks, while full users can only view reports.

Buy Now
Questions 13

How can you view all the relevant incidents for an indicator?

Options:

A.

Linked Incidents column in Indicator Screen

B.

Linked Indicators column in Incident Screen

C.

Related Indicators column in Incident Screen

D.

Related Incidents column in Indicator Screen

Buy Now
Questions 14

What is the primary purpose of Cortex XSIAM’s machine learning led design?

Options:

A.

To group alerts into incidents for manual analysis

B.

To facilitate alert and log management without automation

C.

To effectively handle the bulk of incidents through automation

D.

To rely heavily on human-driven detection and remediation

Buy Now
Questions 15

Which two areas of Cortex XDR are used for threat hunting activities? (Choose two.)

Options:

A.

indicators of compromise (IOC) rules

B.

query builder

C.

live terminal

D.

host insights module

Buy Now
Questions 16

Which attack method is a result of techniques designed to gain access through vulnerabilities in the code of an operating system (OS) or application?

Options:

A.

exploit

B.

malware

C.

phishing

D.

ransomware

Buy Now
Questions 17

What is the requirement for enablement of endpoint and network analytics in Cortex XDR?

Options:

A.

Cloud Identity Engine configured and enabled

B.

Network Mapper applet on the Broker VM configured and enabled

C.

Logs from at least 30 endpoints over a minimum of two weeks

D.

Windows DHCP logs ingested via a Cortex XDR collector

Buy Now
Questions 18

Cortex XDR external data ingestion processes ingest data from which sources?

Options:

A.

windows event logs only

B.

syslogs only

C.

windows event logs, syslogs, and custom external sources

D.

windows event logs and syslogs only

Buy Now
Questions 19

Which product enables the discovery, exchange, and contribution of security automation playbooks, built into Cortex XSOAR?

Options:

A.

XSOAR Threat Intelligence Platform (TIP)

B.

XSOAR Automated Systems

C.

XSOAR Ticketing Systems

D.

XSOAR Marketplace

Buy Now
Questions 20

Given the exception thrown in the accompanying image by the Demisto REST API integration, which action would most likely solve the problem?

Which two playbook functionalities allow looping through a group of tasks during playbook execution? (Choose two.)

Options:

A.

Generic Polling Automation Playbook

B.

Playbook Tasks

C.

Sub-Play books

D.

Playbook Functions

Buy Now
Questions 21

"Bob" is a Demisto user. Which command is used to add 'Bob" to an investigation from the War Room CLI?

Options:

A.

#Bob

B.

/invite Bob

C.

@Bob

D.

!invite Bob

Buy Now
Questions 22

What are process exceptions used for?

Options:

A.

whitelist programs from WildFire analysis

B.

permit processes to load specific DLLs

C.

change the WildFire verdict for a given executable

D.

disable an EPM for a particular process

Buy Now
Questions 23

Which CLI query would bring back Notable Events from Splunk?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 24

Which Cortex XDR capability prevents running malicious files from USB-connected removable equipment?

Options:

A.

Device customization

B.

Agent configuration

C.

Agent management

D.

Restrictions profile

Buy Now
Questions 25

Which statement applies to the malware protection flow in Cortex XDR Prevent?

Options:

A.

Local static analysis happens before a WildFire verdict check.

B.

In the final step, the block list is verified.

C.

A trusted signed file is exempt from local static analysis.

D.

Hash comparisons come after local static analysis.

Buy Now
Questions 26

Why is reputation scoring important in the Threat Intelligence Module of Cortex XSOAR?

Options:

A.

It allows for easy comparison between open-source intelligence and paid services.

B.

It deconflicts prioritization when two vendors give different scores for the same indicator.

C.

It provides a mathematical model for combining scores from multiple vendors.

D.

It helps identify threat intelligence vendors with substandard content.

Buy Now
Questions 27

Which statement applies to the malware protection flow of the endpoint agent in Cortex XSIAM?

Options:

A.

A tile from an allowed signer is exempt from local analysis.

B.

Local analysis always happens before a WildFire verdict check.

C.

Hash comparisons come after local static analysis.

D.

The block list is verified in the final step.

Buy Now
Questions 28

Which service helps identify attackers by combining world-class threat intelligence with Cortex XSIAM technology?

Options:

A.

Virtual Desktop Infrastructure

B.

Managed Threat Hunting

C.

Threat Intelligence Platform

D.

Cloud Identity Engine

Buy Now
Questions 29

In addition to incident volume, which four critical factors must be evaluated to determine effectiveness and ROI on cybersecurity planning and technology?

Options:

A.

Analyst, training costs, duplicated, false positives

B.

People, staffing costs, duplicates, false positives

C.

People, security controls, mean time to detect, false positives

D.

Standard operating procedures, staffing costs, duplicates, mean time to respond

Buy Now
Questions 30

A prospective customer is interested in Cortex XDR but is enable to run a product evaluation.

Which tool can be used instead to showcase Cortex XDR?

Options:

A.

Test Flight

B.

War Game

C.

Tech Rehearsal

D.

Capture the Flag

Buy Now
Questions 31

What is the result of creating an exception from an exploit security event?

Options:

A.

White lists the process from Wild Fire analysis

B.

exempts the user from generating events for 24 hours

C.

exempts administrators from generating alerts for 24 hours

D.

disables the triggered EPM for the host and process involve

Buy Now
Questions 32

What are two reasons incident investigation is needed in Cortex XDR? (Choose two.)

Options:

A.

No solution will stop every attack requiring further investigation of activity.

B.

Insider Threats may not be blocked and initial activity may go undetected.

C.

Analysts need to acquire forensic artifacts of malware that has been blocked by the XDR agent.

D.

Detailed reports are needed for senior management to justify the cost of XDR.

Buy Now
Questions 33

What does DBot use to score an indicator that has multiple reputation scores?

Options:

A.

most severe score

B.

undefined score

C.

average score

D.

least severe score

Buy Now
Questions 34

A customer has purchased Cortex XSOAR and has a need to rapidly stand up the product in their environment. The customer has stated that their internal staff are currently occupied with other projects.

Which Palo Alto Networks service offering should be recommended to the customer?

Options:

A.

Deployment

B.

Onboardinq

C.

Fast-Track

D.

QuickStart

Buy Now
Questions 35

An adversary is attempting to communicate with malware running on your network for the purpose of controlling malware activities or for ex filtrating data from your network. Which Cortex XDR Analytics alert is this activity most likely to trigger'?

Options:

A.

Uncommon Local Scheduled Task Creation

B.

Malware

C.

New Administrative Behavior

D.

DNS Tunneling

Buy Now
Questions 36

How does DBot score an indicator that has multiple reputation scores?

Options:

A.

uses the most severe score scores

B.

the reputation as undefined

C.

uses the average score

D.

uses the least severe score

Buy Now
Questions 37

Where is the best place to find official resource material?

Options:

A.

Online forums

B.

Video series

C.

Administrator's guide

D.

Technical blogs

Buy Now
Questions 38

Which two statements apply to widgets? (Choose two.)

Options:

A.

All widgets are customizable.

B.

Dashboards cannot be shared across an organization.

C.

A widget can have its own time range that is different from the rest of the dashboard.

D.

Some widgets cannot be changed

Buy Now
Questions 39

When preparing the golden image in a Cortex XDR Virtual Desktop Infrastructure (VDI) deployment, which step is required?

Options:

A.

Disable automatic memory dumps.

B.

Scan the image using the imagepreptool.

C.

Launch the VDI conversion tool.

D.

Enable the VDI license timeout.

Buy Now
Questions 40

What are two capabilities of a War Room? (Choose two.)

Options:

A.

create widgets for an investigation

B.

create playbooks for orchestration

C.

act as an audit trail for an investigation

D.

run ad-hoc automation commands

Buy Now
Questions 41

In Cortex XDR Prevent, which three matching criteria can be used to dynamically group endpoints? (Choose three.)

Options:

A.

Domain/workgroup membership

B.

quarantine status

C.

hostname

D.

OS

E.

attack threat intelligence tag

Buy Now
Questions 42

Which feature in Cortex XSIAM extends analytics detections to all mapped network and authentication data?

Options:

A.

Threat feed integration

B.

Automation daybooks

C.

Parsing rules

D.

Data models

Buy Now
Questions 43

What is used to display only file entries in a War Room?

Options:

A.

files from War Room CLI WW

B.

incident files section in layout builder

C.

files and attachments filters

D.

/files from War Room CLI

Buy Now
Questions 44

The prospect is deciding whether to go with a phishing or a ServiceNow use case as part of their POC We have integrations for both but a playbook for phishing only Which use case should be used for the POC?

Options:

A.

phishing

B.

either

C.

ServiceNow

D.

neither

Buy Now
Questions 45

A customer has purchased Cortex XDR and requires phone support for the product.

Which Palo Alto Networks offering would fulfill this need?

Options:

A.

Platinum Success

B.

Premium Success

C.

Diamond Success

D.

Standard Success

Buy Now
Questions 46

What is a benefit offered by Cortex XSOAR?

Options:

A.

It provides advanced customization capabilities.

B.

It provides real-time protection across hosts and containers.

C.

It enables consolidation of multiple point products into a single integrated service.

D.

It enables a comprehensive view of the customer environment with regard to digital employee productivity.

Buy Now
Questions 47

A test for a Microsoft exploit has been planned. After some research Internet Explorer 11 CVE-2016-0189 has been selected and a module in Metasploit has been identified

(exploit/windows/browser/ms16_051_vbscript)

The description and current configuration of the exploit are as follows;

What is the remaining configuration?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 48

Which deployment type supports installation of an engine on Windows, Mac OS. and Linux?

Options:

A.

RPM

B.

SH

C.

DEB

D.

ZIP

Questions 49

Which Cortex XDR capability allows for the immediate termination of a process discovered during investigation of a security event?

Options:

A.

file explorer

B.

Log stitching

C.

live sensor

D.

live terminal

Buy Now
Questions 50

Which playbook functionality allows grouping of tasks to create functional building blocks?

Options:

A.

playbook features

B.

sub-playbooks

C.

conditional tasks

D.

manual tasks

Buy Now
Exam Code: PSE-Cortex
Exam Name: Palo Alto Networks System Engineer - Cortex Professional
Last Update: May 4, 2025
Questions: 168

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99