Practice Free XDR-Analyst Exam Online Questions
In incident-related widgets, how would you filter the display to only show incidents that were “starred”?
- A . Create a custom XQL widget
- B . This is not currently supported
- C . Create a custom report and filter on starred incidents
- D . Click the star in the widget
D
Explanation:
To filter the display to only show incidents that were “starred”, you need to click the star in the widget. This will apply a filter that shows only the incidents that contain a starred alert, which is an alert that matches a specific condition that you define in the incident starring configuration. You can use the incident starring feature to prioritize and focus on the most important or relevant incidents in your environment1.
Let’s briefly discuss the other options to provide a comprehensive explanation:
Which engine, of the following, in Cortex XDR determines the most relevant artifacts in each alert and aggregates all alerts related to an event into an incident?
- A . Sensor Engine
- B . Causality Analysis Engine
- C . Log Stitching Engine
- D . Causality Chain Engine
B
Explanation:
The engine that determines the most relevant artifacts in each alert and aggregates all alerts related to an event into an incident is the Causality Analysis Engine. The Causality Analysis Engine is one of the core components of Cortex XDR that performs advanced analytics on the data collected from various sources, such as endpoints, networks, and clouds. The Causality Analysis Engine uses machine learning and behavioral analysis to identify the root cause, the attack chain, and the impact of each alert. It also groups related alerts into incidents based on the temporal and logical relationships among the alerts. The Causality Analysis Engine helps to reduce the noise and complexity of alerts and incidents, and provides a clear and concise view of the attack story12.
Let’s briefly discuss the other options to provide a comprehensive explanation:
How can you pivot within a row to Causality view and Timeline views for further investigate?
- A . Using the Open Card Only
- B . Using the Open Card and Open Timeline actions respectively
- C . You can’t pivot within a row to Causality view and Timeline views
- D . Using Open Timeline Actions Only
B
Explanation:
To pivot within a row to Causality view and Timeline views for further investigation, you can use the Open Card and Open Timeline actions respectively. The Open Card action will open a new tab with the Causality view of the selected row, showing the causal chain of events that led to the alert. The Open Timeline action will open a new tab with the Timeline view of the selected row, showing the chronological sequence of events that occurred on the affected endpoint. These actions allow you to drill down into the details of each alert and understand the root cause and impact of the incident.
Reference: Cortex XDR User Guide, Chapter 9: Investigate Alerts, Section: Pivot to Causality View and Timeline View
PCDRA Study Guide, Section 3: Investigate and Respond to Alerts, Objective 3.1: Investigate alerts using the Causality view and Timeline view
What contains a logical schema in an XQL query?
- A . Bin
- B . Array expand
- C . Field
- D . Dataset
C
Explanation:
A logical schema in an XQL query is a field, which is a named attribute of a dataset. A field can have a data type, such as string, integer, boolean, or array. A field can also have a modifier, such as bin or expand, that transforms the field value in the query output. A field can be used in the select, where, group by, order by, or having clauses of an XQL query.
Reference: XQL Syntax
XQL Data Types
XQL Field Modifiers
What is the action taken out by Managed Threat Hunting team for Zero Day Exploits?
- A . MTH researches for threats in the tenant and generates a report with the findings.
- B . MTH researches for threats in the logs and reports to engineering.
- C . MTH runs queries and investigative actions and no further action is taken.
- D . MTH pushes content updates to prevent against the zero-day exploits.
A
Explanation:
The Managed Threat Hunting (MTH) team is a group of security experts who proactively hunt for threats in the Cortex XDR tenant and generate a report with the findings. The MTH team uses advanced queries and investigative actions to identify and analyze potential threats, such as zero-day exploits, that may have bypassed the prevention and detection capabilities of Cortex XDR. The MTH team also provides recommendations and best practices to help customers remediate the threats and improve their security posture.
Reference: Managed Threat Hunting Service
Managed Threat Hunting Report
Which version of python is used in live terminal?
- A . Python 2 and 3 with standard Python libraries
- B . Python 2 and 3 with specific XDR Python libraries developed by Palo Alto Networks
- C . Python 3 with specific XDR Python libraries developed by Palo Alto Networks
- D . Python 3 with standard Python libraries
D
Explanation:
Live terminal uses Python 3 with standard Python libraries to run Python commands and scripts on the endpoint. Live terminal does not support Python 2 or any custom or external Python libraries. Live terminal uses the Python interpreter embedded in the Cortex XDR agent, which is based on Python 3.7.4. The standard Python libraries are the modules that are included with the Python installation and provide a wide range of functionalities, such as operating system interfaces, network programming, data processing, and more. You can use the Python commands and scripts to perform advanced tasks or automation on the endpoint, such as querying system information, modifying files or registry keys, or running other applications.
Reference: Run Python Commands and Scripts
Python Standard Library
What is the purpose of the Cortex Data Lake?
- A . a local storage facility where your logs and alert data can be aggregated
- B . a cloud-based storage facility where your firewall logs are stored
- C . the interface between firewalls and the Cortex XDR agents
- D . the workspace for your Cortex XDR agents to detonate potential malware files
B
Explanation:
The purpose of the Cortex Data Lake is to provide a cloud-based storage facility where your firewall logs are stored. Cortex Data Lake is a service that collects, transforms, and integrates your enterprise’s security data to enable Palo Alto Networks solutions. It powers AI and machine learning, detection accuracy, and app and service innovation. Cortex Data Lake automatically collects, integrates, and normalizes data across your security infrastructure, including your next-generation firewalls, Prisma Access, and Cortex XDR. With unified data, you can run advanced AI and machine learning to radically simplify security operations with apps built on Cortex. Cortex Data Lake is available in multiple regions and supports data residency and privacy requirements.
Reference: Cortex Data Lake – Palo Alto Networks
Cortex Data Lake – Palo Alto Networks
Cortex Data Lake, the technology behind Cortex XDR – Palo Alto Networks CORTEX DATA LAKE – Palo Alto Networks
Sizing for Cortex Data Lake Storage – Palo Alto Networks
The Cortex XDR console has triggered an incident, blocking a vitally important piece of software in your organization that is known to be benign.
Which of the following options would prevent Cortex XDR from blocking this software in the future, for all endpoints in your organization?
- A . Create an individual alert exclusion.
- B . Create a global inclusion.
- C . Create an endpoint-specific exception.
- D . Create a global exception.
D
Explanation:
A global exception is a rule that allows you to exclude specific files, processes, or behaviors from being blocked or detected by Cortex XDR. A global exception applies to all endpoints in your organization that are protected by Cortex XDR. Creating a global exception for a vitally important piece of software that is known to be benign would prevent Cortex XDR from blocking this software in the future, for all endpoints in your organization.
To create a global exception, you need to follow these steps:
In the Cortex XDR management console, go to Policy Management > Exceptions and click Add Exception.
Select the Global Exception option and click Next.
Enter a name and description for the exception and click Next.
Select the type of exception you want to create, such as file, process, or behavior, and click Next. Specify the criteria for the exception, such as file name, hash, path, process name, command line, or behavior name, and click Next.
Review the summary of the exception and click Finish.
Reference: Create Global Exceptions: This document explains how to create global exceptions to exclude specific files, processes, or behaviors from being blocked or detected by Cortex XDR.
Exceptions Overview: This document provides an overview of exceptions and how they can be used to fine-tune the Cortex XDR security policy.
What is the standard installation disk space recommended to install a Broker VM?
- A . 1GB disk space
- B . 2GB disk space
- C . 512GB disk space
- D . 256GB disk space
D
Explanation:
The Broker VM for Cortex XDR is a virtual machine that serves as the central communication hub for all Cortex XDR agents deployed in your organization. It enables agents to communicate with the Cortex XDR cloud service and allows you to manage and monitor the agents’ activities from a centralized location.
The system requirements for the Broker VM are as follows:
CPU: 4 cores
RAM: 8 GB
Disk space: 256 GB
Network: Internet access and connectivity to all Cortex XDR agents
The disk space requirement is based on the number of agents and the frequency of content updates. The Broker VM stores the content updates locally and distributes them to the agents. The disk space also depends on the retention period of the content updates, which can be configured in the Broker VM settings. The default retention period is 30 days.
Reference: Broker VM for Cortex XDR
PCDRA Study Guide
Cortex XDR is deployed in the enterprise and you notice a cobalt strike attack via an ongoing supply chain compromise was prevented on 1 server.
What steps can you take to ensure the same protection is extended to all your servers?
- A . Conduct a thorough Endpoint Malware scan.
- B . Enable DLL Protection on all servers but there might be some false positives.
- C . Enable Behavioral Threat Protection (BTP) with cytool to prevent the attack from spreading.
- D . Create lOCs of the malicious files you have found to prevent their execution.
D
Explanation:
The best step to ensure the same protection is extended to all your servers is to create indicators of compromise (IOCs) of the malicious files you have found to prevent their execution. IOCs are pieces of information that indicate a potential threat or compromise on an endpoint, such as file hashes, IP addresses, domain names, or registry keys. You can create IOCs in Cortex XDR to block or alert on any file or network activity that matches the IOCs. By creating IOCs of the malicious files involved in the cobalt strike attack, you can prevent them from running or spreading on any of your servers.
The other options are not the best steps for the following reasons:
A is not the best step because conducting a thorough Endpoint Malware scan may not detect or prevent the cobalt strike attack if the malicious files are obfuscated, encrypted, or hidden. Endpoint Malware scan is a feature of Cortex XDR that allows you to scan endpoints for known malware and quarantine any malicious files found. However, Endpoint Malware scan may not be effective against unknown or advanced threats that use evasion techniques to avoid detection.
B is not the best step because enabling DLL Protection on all servers may cause some false positives and disrupt legitimate applications. DLL Protection is a feature of Cortex XDR that allows you to block or alert on any DLL loading activity that matches certain criteria, such as unsigned DLLs, DLLs loaded from network locations, or DLLs loaded by specific processes. However, DLL Protection may also block or alert on benign DLL loading activity that is part of normal system or application operations, resulting in false positives and performance issues.
C is not the best step because enabling Behavioral Threat Protection (BTP) with cytool may not prevent the attack from spreading if the malicious files are already on the endpoints or if the attack uses other methods to evade detection. Behavioral Threat Protection is a feature of Cortex XDR that allows you to block or alert on any endpoint behavior that matches certain patterns, such as ransomware, credential theft, or lateral movement. Cytool is a command-line tool that allows you to configure and manage the Cortex XDR agent on the endpoint. However, Behavioral Threat Protection may not prevent the attack from spreading if the malicious files are already on the endpoints or if the attack uses other methods to evade detection, such as encryption, obfuscation, or proxy servers.
Reference: Create IOCs
Scan an Endpoint for Malware
DLL Protection
Behavioral Threat Protection
Cytool for Windows
