Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

XDR-Analyst Sample Questions Answers

Questions 4

Which engine, of the following, in Cortex XDR determines the most relevant artifacts in each alert and aggregates all alerts related to an event into an incident?

Options:

A.

Sensor Engine

B.

Causality Analysis Engine

C.

Log Stitching Engine

D.

Causality Chain Engine

Buy Now
Questions 5

What does the following output tell us?

Options:

A.

There is one low severity incident.

B.

Host shpapy_win10 had the most vulnerabilities.

C.

There is one informational severity alert.

D.

This is an actual output of the Top 10 hosts with the most malware.

Buy Now
Questions 6

What contains a logical schema in an XQL query?

Options:

A.

Bin

B.

Array expand

C.

Field

D.

Dataset

Buy Now
Questions 7

Live Terminal uses which type of protocol to communicate with the agent on the endpoint?

Options:

A.

NetBIOS over TCP

B.

WebSocket

C.

UDP and a random port

D.

TCP, over port 80

Buy Now
Questions 8

Which module provides the best visibility to view vulnerabilities?

Options:

A.

Live Terminal module

B.

Device Control Violations module

C.

Host Insights module

D.

Forensics module

Buy Now
Questions 9

Which profiles can the user use to configure malware protection in the Cortex XDR console?

Options:

A.

Malware Protection profile

B.

Malware profile

C.

Malware Detection profile

D.

Anti-Malware profile

Buy Now
Questions 10

Where would you view the WildFire report in an incident?

Options:

A.

next to relevant Key Artifacts in the incidents details page

B.

under Response --> Action Center

C.

under the gear icon --> Agent Audit Logs

D.

on the HUB page at apps.paloaltonetworks.com

Buy Now
Questions 11

To stop a network-based attack, any interference with a portion of the attack pattern is enough to prevent it from succeeding. Which statement is correct regarding the Cortex XDR Analytics module?

Options:

A.

It does not interfere with any portion of the pattern on the endpoint.

B.

It interferes with the pattern as soon as it is observed by the firewall.

C.

It does not need to interfere with the any portion of the pattern to prevent the attack.

D.

It interferes with the pattern as soon as it is observed on the endpoint.

Buy Now
Questions 12

Which built-in dashboard would be the best option for an executive, if they were looking for the Mean Time to Resolution (MTTR) metric?

Options:

A.

Security Manager Dashboard

B.

Data Ingestion Dashboard

C.

Security Admin Dashboard

D.

Incident Management Dashboard

Buy Now
Questions 13

Which of the following represents the correct relation of alerts to incidents?

Options:

A.

Only alerts with the same host are grouped together into one Incident in a given time frame.

B.

Alerts that occur within a three-hour time frame are grouped together into one Incident.

C.

Alerts with same causality chains that occur within a given time frame are grouped together into an Incident.

D.

Every alert creates a new Incident.

Buy Now
Questions 14

Cortex XDR Analytics can alert when detecting activity matching the following MITRE ATT&CKTM techniques.

Options:

A.

Exfiltration, Command and Control, Collection

B.

Exfiltration, Command and Control, Privilege Escalation

C.

Exfiltration, Command and Control, Impact

D.

Exfiltration, Command and Control, Lateral Movement

Buy Now
Questions 15

What license would be required for ingesting external logs from various vendors?

Options:

A.

Cortex XDR Pro per Endpoint

B.

Cortex XDR Vendor Agnostic Pro

C.

Cortex XDR Pro per TB

D.

Cortex XDR Cloud per Host

Buy Now
Questions 16

Which of the following is NOT a precanned script provided by Palo Alto Networks?

Options:

A.

delete_file

B.

quarantine_file

C.

process_kill_name

D.

list_directories

Buy Now
Questions 17

Which statement is true for Application Exploits and Kernel Exploits?

Options:

A.

The ultimate goal of any exploit is to reach the application.

B.

Kernel exploits are easier to prevent then application exploits.

C.

The ultimate goal of any exploit is to reach the kernel.

D.

Application exploits leverage kernel vulnerability.

Buy Now
Questions 18

What is the purpose of targeting software vendors in a supply-chain attack?

Options:

A.

to take advantage of a trusted software delivery method.

B.

to steal users’ login credentials.

C.

to access source code.

D.

to report Zero-day vulnerabilities.

Buy Now
Questions 19

What types of actions you can execute with live terminal session?

Options:

A.

Manage Network configurations, Quarantine Files, Run PowerShell scripts

B.

Manage Processes, Manage Files, Run Operating System Commands, Run Ruby Commands and Scripts

C.

Apply patches, Reboot System, send notification for end user, Run Python Commands and Scripts

D.

Manage Processes, Manage Files, Run Operating System Commands, Run Python Commands and Scripts

Buy Now
Questions 20

What is an example of an attack vector for ransomware?

Options:

A.

Performing DNS queries for suspicious domains

B.

Performing SSL Decryption on an endpoint

C.

Phishing emails containing malicious attachments

D.

A URL filtering feature enabled on a firewall

Buy Now
Questions 21

In Windows and macOS you need to prevent the Cortex XDR Agent from blocking execution of a file based on the digital signer. What is one way to add an exception for the singer?

Options:

A.

In the Restrictions Profile, add the file name and path to the Executable Files allow list.

B.

Create a new rule exception and use the singer as the characteristic.

C.

Add the signer to the allow list in the malware profile.

D.

Add the signer to the allow list under the action center page.

Buy Now
Questions 22

In incident-related widgets, how would you filter the display to only show incidents that were “starred”?

Options:

A.

Create a custom XQL widget

B.

This is not currently supported

C.

Create a custom report and filter on starred incidents

D.

Click the star in the widget

Buy Now
Questions 23

What is by far the most common tactic used by ransomware to shut down a victim’s operation?

Options:

A.

preventing the victim from being able to access APIs to cripple infrastructure

B.

denying traffic out of the victims network until payment is received

C.

restricting access to administrative accounts to the victim

D.

encrypting certain files to prevent access by the victim

Buy Now
Questions 24

What kind of the threat typically encrypts user files?

Options:

A.

ransomware

B.

SQL injection attacks

C.

Zero-day exploits

D.

supply-chain attacks

Buy Now
Questions 25

Which statement regarding scripts in Cortex XDR is true?

Options:

A.

Any version of Python script can be run.

B.

The level of risk is assigned to the script upon import.

C.

Any script can be imported including Visual Basic (VB) scripts.

D.

The script is run on the machine uploading the script to ensure that it is operational.

Buy Now
Questions 26

What is the maximum number of agents one Broker VM local agent applet can support?

Options:

A.

5,000

B.

10,000

C.

15,000

D.

20,000

Buy Now
Questions 27

The Cortex XDR console has triggered an incident, blocking a vitally important piece of software in your organization that is known to be benign. Which of the following options would prevent Cortex XDR from blocking this software in the future, for all endpoints in your organization?

Options:

A.

Create an individual alert exclusion.

B.

Create a global inclusion.

C.

Create an endpoint-specific exception.

D.

Create a global exception.

Buy Now
Exam Code: XDR-Analyst
Exam Name: Palo Alto Networks XDR Analyst
Last Update: Dec 12, 2025
Questions: 91
$66  $164.99
$50  $124.99
$42  $104.99
buy now XDR-Analyst