Which feature in Cortex XSIAM extends analytics detections to all mapped network and authentication data?
Which integration allows searching and displaying Splunk results within Cortex XSOAR?
Which Cortex XDR capability prevents running malicious files from USB-connected removable equipment?
In Cortex XDR Prevent, which three matching criteria can be used to dynamically group endpoints? (Choose three )
A customer has purchased Cortex Data Lake storage with the following configuration, which requires 2 TB of Cortex Data Lake to order:
support for 300 total Cortex XDR clients all forwarding Cortex XDR data with 30-day retention
storage for higher fidelity logs to support Cortex XDR advanced analytics
The customer now needs 1000 total Cortex XDR clients, but continues with 300 clients forwarding Cortex XDR data with 30-day retention.
What is the new total storage requirement for Cortex Data Lake storage to order?
Which resource can a customer use to ensure that the Cortex XDR agent will operate correctly on their CentOS 07 servers?
Which aspect of Cortex Xpanse allows for visibility over remote workforce risks?
What is the requirement for enablement of endpoint and network analytics in Cortex XDR?
A customer has purchased Cortex XDR and requires phone support for the product.
Which Palo Alto Networks offering would fulfill this need?
Which command-line interface (CLI) query would retrieve the last three Splunk events?
Which playbook functionality allows grouping of tasks to create functional building blocks?
A Cortex XSOAR customer wants to send a survey to users asking them to input their manager's email for a training use case so the manager can receive status reports on the employee's training. However, the customer is concerned users will provide incorrect information to avoid sending status updates to their manager.
How can Cortex XSOAR most efficiently sanitize user input prior to using the responses in the playbook?
What are two ways a customer can configure user authentication access Cortex Xpanse? (Choose two.)
Which two log types should be configured for firewall forwarding to the Cortex Data Lake for use by Cortex XDR? (Choose two)
Which Linux OS command will manually load Docker images onto the Cortex XSOAR server in an air-gapped environment?
An antivirus refresh project was initiated by the IT operations executive. Who is the best source for discussion about the project's operational considerations'?
Which task allows the playbook to follow different paths based on specific conditions?
Which three Demisto incident type features can be customized under Settings > Advanced > Incident Types? (Choose three.)
How does the integration between Cortex Xpanse and Cortex XSOAR benefit security teams?
What method does the Traps agent use to identify malware during a scheduled scan?
Given the integration configuration and error in the screenshot what is the cause of the problem?
Which service helps uncover attackers wherever they hide by combining world-class threat hunters with Cortex XDR technology that runs on integrated endpoint, network, and cloud data sources?
When preparing the golden image in a Cortex XDR Virtual Desktop Infrastructure (VDI) deployment, which step is required?
A Cortex Xpanse customer receives an email regarding an upcoming product update and wants to get more information on the new features.
In which resource can the customer access this information?
What allows the use of predetermined Palo Alto Networks roles to assign access rights to Cortex XDR users?
A prospective customer is interested in Cortex XDR but is enable to run a product evaluation.
Which tool can be used instead to showcase Cortex XDR?
A prospect has agreed to do a 30-day POC and asked to integrate with a product that Demisto currently does not have an integration with. How should you respond?
Cortex XSOAR has extracted a malicious IP address involved in command-and-control traffic.
What is the best method to automatically block this IP from communicating with endpoints without requiring a configuration change on the firewall?
A Cortex XSOAR customer has a phishing use case in which a playbook has been implemented with one of the steps blocking a malicious URL found in an email reported by one of the users.
What would be the appropriate next step in the playbook?
Which two Cortex XSOAR incident type features can be customized under Settings > Advanced > Incident Types? (Choose two.)
How does a clear understanding of a customer’s technical expertise assist in a hand off following the close of an opportunity?
What is the function of reputation scoring in the Threat Intelligence Module of Cortex XSIAM?
Which Cortex XDR license is required for a customer that requests endpoint detection and response (EDR) data collection capabilities?