ExamGecko

Palo Alto Networks PCDRA Practice Test - Questions Answers

Question list
Search
Search

When investigating security events, which feature in Cortex XDR is useful for reverting the changes on the endpoint?

A.
Remediation Automation
A.
Remediation Automation
Answers
B.
Machine Remediation
B.
Machine Remediation
Answers
C.
Automatic Remediation
C.
Automatic Remediation
Answers
D.
Remediation Suggestions
D.
Remediation Suggestions
Answers
Suggested answer: D

Explanation:

When investigating security events, the feature in Cortex XDR that is useful for reverting the changes on the endpoint isRemediation Suggestions. Remediation Suggestions are a feature of Cortex XDR that provide you with recommended actions to undo the effects of malicious activity on your endpoints. You can view the remediation suggestions for each alert or incident in the Cortex XDR console, and decide whether to apply them or not. Remediation Suggestions can help you restore the endpoint to its original state, remove malicious files or processes, or fix registry or system settings. Remediation Suggestions are based on the forensic data collected by the Cortex XDR agent and the analysis performed by Cortex XDR.Reference:

Remediation Suggestions

Apply Remediation Suggestions

What is the purpose of the Cortex Data Lake?

A.
a local storage facility where your logs and alert data can be aggregated
A.
a local storage facility where your logs and alert data can be aggregated
Answers
B.
a cloud-based storage facility where your firewall logs are stored
B.
a cloud-based storage facility where your firewall logs are stored
Answers
C.
the interface between firewalls and the Cortex XDR agents
C.
the interface between firewalls and the Cortex XDR agents
Answers
D.
the workspace for your Cortex XDR agents to detonate potential malware files
D.
the workspace for your Cortex XDR agents to detonate potential malware files
Answers
Suggested answer: B

Explanation:

The purpose of the Cortex Data Lake is to provide a cloud-based storage facility where your firewall logs are stored. Cortex Data Lake is a service that collects, transforms, and integrates your enterprise's security data to enable Palo Alto Networks solutions. It powers AI and machine learning, detection accuracy, and app and service innovation. Cortex Data Lake automatically collects, integrates, and normalizes data across your security infrastructure, including your next-generation firewalls, Prisma Access, and Cortex XDR. With unified data, you can run advanced AI and machine learning to radically simplify security operations with apps built on Cortex. Cortex Data Lake is available in multiple regions and supports data residency and privacy requirements.Reference:

Cortex Data Lake - Palo Alto Networks

Cortex Data Lake - Palo Alto Networks

Cortex Data Lake, the technology behind Cortex XDR - Palo Alto Networks

CORTEX DATA LAKE - Palo Alto Networks

Sizing for Cortex Data Lake Storage - Palo Alto Networks

When creating a scheduled report which is not an option?

A.
Run weekly on a certain day and time.
A.
Run weekly on a certain day and time.
Answers
B.
Run quarterly on a certain day and time.
B.
Run quarterly on a certain day and time.
Answers
C.
Run monthly on a certain day and time.
C.
Run monthly on a certain day and time.
Answers
D.
Run daily at a certain time (selectable hours and minutes).
D.
Run daily at a certain time (selectable hours and minutes).
Answers
Suggested answer: B

Explanation:

When creating a scheduled report in Cortex XDR, the option to run quarterly on a certain day and time isnotavailable. You can only schedule reports to run daily, weekly, or monthly. You can also specify the start and end dates, the time zone, and the recipients of the report. Scheduled reports are useful for generating regular reports on the security events, incidents, alerts, or endpoints in your network. You can create scheduled reports from the Reports page in the Cortex XDR console, or from the Query Center by saving a query as a report.Reference:

Run or Schedule Reports

Create a Scheduled Report

Which statement regarding scripts in Cortex XDR is true?

A.
Any version of Python script can be run.
A.
Any version of Python script can be run.
Answers
B.
The level of risk is assigned to the script upon import.
B.
The level of risk is assigned to the script upon import.
Answers
C.
Any script can be imported including Visual Basic (VB) scripts.
C.
Any script can be imported including Visual Basic (VB) scripts.
Answers
D.
The script is run on the machine uploading the script to ensure that it is operational.
D.
The script is run on the machine uploading the script to ensure that it is operational.
Answers
Suggested answer: B

Explanation:

The correct answer is B, the level of risk is assigned to the script upon import. When you import a script to the Agent Script Library in Cortex XDR, you need to specify the level of risk associated with the script. The level of risk determines the permissions and restrictions for running the script on endpoints. The levels of risk are:

Low: The script can be run on any endpoint without requiring approval from the Cortex XDR administrator. The script can also be used in remediation suggestions or automation actions.

Medium: The script can be run on any endpoint, but requires approval from the Cortex XDR administrator. The script can also be used in remediation suggestions or automation actions.

High: The script can only be run on isolated endpoints, and requires approval from the Cortex XDR administrator. The script cannot be used in remediation suggestions or automation actions.

The other options are incorrect for the following reasons:

A is incorrect because not any version of Python script can be run in Cortex XDR. The scripts must be written in Python 2.7, and must follow the guidelines and limitations described in the Cortex XDR documentation. For example, the scripts must not exceed 64 KB in size, must not use external libraries or modules, and must not contain malicious or harmful code.

C is incorrect because not any script can be imported to Cortex XDR, including Visual Basic (VB) scripts. The scripts must be written in Python 2.7, and must follow the guidelines and limitations described in the Cortex XDR documentation. VB scripts are not supported by Cortex XDR, and will not run on the endpoints.

D is incorrect because the script is not run on the machine uploading the script to ensure that it is operational. The script is only validated for syntax errors and size limitations when it is imported to the Agent Script Library. The script is not executed or tested on the machine uploading the script, and the script may still fail or cause errors when it is run on the endpoints.

Agent Script Library

Import a Script

Run Scripts on an Endpoint

What is the function of WildFire for Cortex XDR?

A.
WildFire runs in the cloud and analyses alert data from the XDR agent to check for behavioural threats.
A.
WildFire runs in the cloud and analyses alert data from the XDR agent to check for behavioural threats.
Answers
B.
WildFire is the engine that runs on the local agent and determines whether behavioural threats are occurring on the endpoint.
B.
WildFire is the engine that runs on the local agent and determines whether behavioural threats are occurring on the endpoint.
Answers
C.
WildFire accepts and analyses a sample to provide a verdict.
C.
WildFire accepts and analyses a sample to provide a verdict.
Answers
D.
WildFire runs entirely on the agent to quickly analyse samples and provide a verdict.
D.
WildFire runs entirely on the agent to quickly analyse samples and provide a verdict.
Answers
Suggested answer: C

Explanation:

WildFire is a cloud-based service that accepts and analyses samples from various sources, including Cortex XDR, to provide a verdict of malware, benign, or grayware. WildFire also generates detailed analysis reports that show the behaviour and characteristics of the samples. Cortex XDR uses WildFire verdicts and reports to enhance its detection and prevention capabilities, as well as to provide more visibility and context into the threats.Reference:

WildFire Analysis Concepts

WildFire Overview

Which profiles can the user use to configure malware protection in the Cortex XDR console?

A.
Malware Protection profile
A.
Malware Protection profile
Answers
B.
Malware profile
B.
Malware profile
Answers
C.
Malware Detection profile
C.
Malware Detection profile
Answers
D.
Anti-Malware profile
D.
Anti-Malware profile
Answers
Suggested answer: A

Explanation:

The user can use theMalware Protection profileto configure malware protection in the Cortex XDR console. The Malware Protection profile defines the actions that Cortex XDR takes when it detects malware on your endpoints. You can configure different actions for different types of malware, such as ransomware, password theft, or child process. You can also configure the scan frequency and scope for periodic malware scans. The Malware Protection profile is part of the Endpoint Security policy that you assign to your endpoints.Reference:

Malware Protection Profile

Endpoint Security Policy

Which module provides the best visibility to view vulnerabilities?

A.
Live Terminal module
A.
Live Terminal module
Answers
B.
Device Control Violations module
B.
Device Control Violations module
Answers
C.
Host Insights module
C.
Host Insights module
Answers
D.
Forensics module
D.
Forensics module
Answers
Suggested answer: C

Explanation:

TheHost Insights moduleprovides the best visibility to view vulnerabilities on your endpoints. The Host Insights module is an add-on feature for Cortex XDR that combines vulnerability management, application and system visibility, and a Search and Destroy feature to help you identify and contain threats. The vulnerability management feature allows you to scan your Windows endpoints for known vulnerabilities and missing patches, and view the results in the Cortex XDR console. You can also filter and sort the vulnerabilities by severity, CVSS score, CVE ID, or patch availability. The Host Insights module helps you reduce your exposure to threats and improve your security posture.Reference:

Host Insights

Vulnerability Management

Which of the following is NOT a precanned script provided by Palo Alto Networks?

A.
delete_file
A.
delete_file
Answers
B.
quarantine_file
B.
quarantine_file
Answers
C.
process_kill_name
C.
process_kill_name
Answers
D.
list_directories
D.
list_directories
Answers
Suggested answer: D

Explanation:

Palo Alto Networks provides a set of precanned scripts that you can use to perform various actions on your endpoints, such as deleting files, killing processes, or quarantining malware. The precanned scripts are written in Python and are available in the Agent Script Library in the Cortex XDR console. You can use the precanned scripts as they are, or you can customize them to suit your needs. The precanned scripts are:

delete_file: Deletes a specific file from a local or removable drive.

quarantine_file: Moves a specific file from its location on a local or removable drive to a protected folder and prevents it from being executed.

process_kill_name: Kills a process by its name on the endpoint.

process_kill_pid: Kills a process by its process ID (PID) on the endpoint.

process_kill_tree: Kills a process and all its child processes by its name on the endpoint.

process_kill_tree_pid: Kills a process and all its child processes by its PID on the endpoint.

process_list: Lists all the processes running on the endpoint, along with their names, PIDs, and command lines.

process_list_tree: Lists all the processes running on the endpoint, along with their names, PIDs, command lines, and parent processes.

process_start: Starts a process on the endpoint by its name or path.

registry_delete_key: Deletes a registry key and all its subkeys and values from the Windows registry.

registry_delete_value: Deletes a registry value from the Windows registry.

registry_list_key: Lists all the subkeys and values under a registry key in the Windows registry.

registry_list_value: Lists the value and data of a registry value in the Windows registry.

registry_set_value: Sets the value and data of a registry value in the Windows registry.

The script list_directories isnota precanned script provided by Palo Alto Networks. It is a custom script that you can write yourself using Python commands.

Run Scripts on an Endpoint

Agent Script Library

Precanned Scripts

The Cortex XDR console has triggered an incident, blocking a vitally important piece of software in your organization that is known to be benign. Which of the following options would prevent Cortex XDR from blocking this software in the future, for all endpoints in your organization?

A.
Create an individual alert exclusion.
A.
Create an individual alert exclusion.
Answers
B.
Create a global inclusion.
B.
Create a global inclusion.
Answers
C.
Create an endpoint-specific exception.
C.
Create an endpoint-specific exception.
Answers
D.
Create a global exception.
D.
Create a global exception.
Answers
Suggested answer: D

Explanation:

A global exception is a rule that allows you to exclude specific files, processes, or behaviors from being blocked or detected by Cortex XDR. A global exception applies to all endpoints in your organization that are protected by Cortex XDR. Creating a global exception for a vitally important piece of software that is known to be benign would prevent Cortex XDR from blocking this software in the future, for all endpoints in your organization.

To create a global exception, you need to follow these steps:

In the Cortex XDR management console, go toPolicy Management > Exceptionsand clickAdd Exception.

Select theGlobal Exceptionoption and clickNext.

Enter a name and description for the exception and clickNext.

Select the type of exception you want to create, such as file, process, or behavior, and clickNext.

Specify the criteria for the exception, such as file name, hash, path, process name, command line, or behavior name, and clickNext.

Review the summary of the exception and clickFinish.

Create Global Exceptions: This document explains how to create global exceptions to exclude specific files, processes, or behaviors from being blocked or detected by Cortex XDR.

Exceptions Overview: This document provides an overview of exceptions and how they can be used to fine-tune the Cortex XDR security policy.

Which of the following paths will successfully activate Remediation Suggestions?

A.
Incident View > Actions > Remediation Suggestions
A.
Incident View > Actions > Remediation Suggestions
Answers
B.
Causality View > Actions > Remediation Suggestions
B.
Causality View > Actions > Remediation Suggestions
Answers
C.
Alerts Table > Right-click on a process node > Remediation Suggestions
C.
Alerts Table > Right-click on a process node > Remediation Suggestions
Answers
D.
Alerts Table > Right-click on an alert > Remediation Suggestions
D.
Alerts Table > Right-click on an alert > Remediation Suggestions
Answers
Suggested answer: B

Explanation:

Remediation Suggestions is a feature of Cortex XDR that provides you with recommended actions to remediate the root cause and impact of an incident. Remediation Suggestions are based on the analysis of the causality chain, the behavior of the malicious files or processes, and the best practices for incident response. Remediation Suggestions can help you to quickly and effectively contain and resolve an incident, as well as prevent future recurrence.

To activate Remediation Suggestions, you need to follow these steps:

In the Cortex XDR management console, go toIncidentsand select an incident that you want to remediate.

ClickCausality Viewto see the graphical representation of the causality chain of the incident.

ClickActionsand selectRemediation Suggestions. This will open a new window that shows the suggested actions for each node in the causality chain.

Review the suggested actions and select the ones that you want to apply. You can also edit or delete the suggested actions, or add your own custom actions.

ClickApplyto execute the selected actions on the affected endpoints. You can also schedule the actions to run at a later time or date.

Remediate Changes from Malicious Activity: This document explains how to use Remediation Suggestions to remediate the root cause and impact of an incident.

Causality View: This document describes how to use Causality View to investigate the causality chain of an incident.

Total 91 questions
Go to page: of 10