ExamGecko

Palo Alto Networks PCDRA Practice Test - Questions Answers, Page 2

Question list
Search
Search

What is an example of an attack vector for ransomware?

A.
Performing DNS queries for suspicious domains
A.
Performing DNS queries for suspicious domains
Answers
B.
Performing SSL Decryption on an endpoint
B.
Performing SSL Decryption on an endpoint
Answers
C.
Phishing emails containing malicious attachments
C.
Phishing emails containing malicious attachments
Answers
D.
A URL filtering feature enabled on a firewall
D.
A URL filtering feature enabled on a firewall
Answers
Suggested answer: C

Explanation:

An example of an attack vector for ransomware is phishing emails containing malicious attachments. Phishing is a technique that involves sending fraudulent emails that appear to come from a legitimate source, such as a bank, a company, or a government agency. The emails typically contain a malicious attachment, such as a PDF document, a ZIP archive, or a Microsoft Office document, that contains ransomware or a ransomware downloader. When the recipient opens or downloads the attachment, the ransomware is executed and encrypts the files or data on the victim's system. The attacker then demands a ransom for the decryption key, usually in cryptocurrency.

Phishing emails are one of the most common and effective ways of delivering ransomware, as they can bypass security measures such as firewalls, antivirus software, or URL filtering. Phishing emails can also exploit the human factor, as they can trick the recipient into opening the attachment by using social engineering techniques, such as impersonating a trusted sender, creating a sense of urgency, or appealing to curiosity or greed. Phishing emails can also target specific individuals or organizations, such as executives, employees, or customers, in a technique called spear phishing, which increases the chances of success.

According to various sources, phishing emails are the main vector of ransomware attacks, accounting for more than 90% of all ransomware infections12.Some of the most notorious ransomware campaigns, such as CryptoLocker, Locky, and WannaCry, have used phishing emails as their primary delivery method3. Therefore, it is essential to educate users on how to recognize and avoid phishing emails, as well as to implement security solutions that can detect and block malicious attachments.Reference:

Top 7 Ransomware Attack Vectors & How to Avoid Becoming a Victim - Bitsight

What Is the Main Vector of Ransomware Attacks? A Definitive Guide

CryptoLocker Ransomware Information Guide and FAQ

[Locky Ransomware Information, Help Guide, and FAQ]

[WannaCry ransomware attack]

What is the Wildfire analysis file size limit for Windows PE files?

A.
No Limit
A.
No Limit
Answers
B.
500MB
B.
500MB
Answers
C.
100MB
C.
100MB
Answers
D.
1GB
D.
1GB
Answers
Suggested answer: C

Explanation:

The Wildfire analysis file size limit for Windows PE files is 100MB. Windows PE files are executable files that run on the Windows operating system, such as .exe, .dll, .sys, or .scr files. Wildfire is a cloud-based service that analyzes files and URLs for malicious behavior and generates signatures and protections for them. Wildfire can analyze various file types, such as PE, APK, PDF, MS Office, and others, but each file type has a different file size limit. The file size limit determines the maximum size of the file that can be uploaded or forwarded to Wildfire for analysis. If the file size exceeds the limit, Wildfire will not analyze the file and will return an error message.

According to the Wildfire documentation1, the file size limit for Windows PE files is 100MB. This means that any PE file that is larger than 100MB will not be analyzed by Wildfire. However, the firewall can still apply other security features, such as antivirus, anti-spyware, vulnerability protection, and file blocking, to the PE file based on the security policy settings.The firewall can also perform local analysis on the PE file using the Cortex XDR agent, which uses machine learning models to assess the file and assign it a verdict2.

WildFire File Size Limits: This document provides the file size limits for different file types that can be analyzed by Wildfire.

Local Analysis: This document explains how the Cortex XDR agent performs local analysis on files that cannot be sent to Wildfire for analysis.

How can you pivot within a row to Causality view and Timeline views for further investigate?

A.
Using the Open Card Only
A.
Using the Open Card Only
Answers
B.
Using the Open Card and Open Timeline actions respectively
B.
Using the Open Card and Open Timeline actions respectively
Answers
C.
You can't pivot within a row to Causality view and Timeline views
C.
You can't pivot within a row to Causality view and Timeline views
Answers
D.
Using Open Timeline Actions Only
D.
Using Open Timeline Actions Only
Answers
Suggested answer: B

Explanation:

To pivot within a row to Causality view and Timeline views for further investigation, you can use the Open Card and Open Timeline actions respectively. The Open Card action will open a new tab with the Causality view of the selected row, showing the causal chain of events that led to the alert. The Open Timeline action will open a new tab with the Timeline view of the selected row, showing the chronological sequence of events that occurred on the affected endpoint. These actions allow you to drill down into the details of each alert and understand the root cause and impact of the incident.Reference:

Cortex XDR User Guide, Chapter 9: Investigate Alerts, Section: Pivot to Causality View and Timeline View

PCDRA Study Guide, Section 3: Investigate and Respond to Alerts, Objective 3.1: Investigate alerts using the Causality view and Timeline view


Which of the following Live Terminal options are available for Android systems?

A.
Live Terminal is not supported.
A.
Live Terminal is not supported.
Answers
B.
Stop an app.
B.
Stop an app.
Answers
C.
Run APK scripts.
C.
Run APK scripts.
Answers
D.
Run Android commands.
D.
Run Android commands.
Answers
Suggested answer: D

Explanation:

Cortex XDR supports Live Terminal for Android systems, which allows you to remotely access and manage Android endpoints using a command-line interface. You can use Live Terminal to run Android commands, such asadb shell,adb logcat,adb install, andadb uninstall. You can also use Live Terminal to view and modify files, directories, and permissions on the Android endpoints. Live Terminal for Android systems does not support stopping an app or running APK scripts.Reference:

Cortex XDR documentation portal

Initiate a Live Terminal Session

Live Terminal Commands

Which search methods is supported by File Search and Destroy?

A.
File Seek and Destroy
A.
File Seek and Destroy
Answers
B.
File Search and Destroy
B.
File Search and Destroy
Answers
C.
File Seek and Repair
C.
File Seek and Repair
Answers
D.
File Search and Repair
D.
File Search and Repair
Answers
Suggested answer: B

Explanation:

File Search and Destroy is a feature of Cortex XDR that allows you to search for and remove malicious files from endpoints. You can use this feature to find files by their hash, full path, or partial path using regex parameters. You can then select the files from the search results and destroy them by hash or by path. When you destroy a file by hash, all the file instances on the endpoint are removed. File Search and Destroy is useful for quickly responding to threats and preventing further damage.Reference:

Search and Destroy Malicious Files

Cortex XDR Pro Administrator Guide

In the Cortex XDR console, from which two pages are you able to manually perform the agent upgrade action? (Choose two.)

A.
Asset Management
A.
Asset Management
Answers
B.
Agent Installations
B.
Agent Installations
Answers
C.
Action Center
C.
Action Center
Answers
D.
Endpoint Administration
D.
Endpoint Administration
Answers
Suggested answer: A, D

Explanation:

To manually upgrade the Cortex XDR agents, you can use theAsset Managementpage or theEndpoint Administrationpage in the Cortex XDR console. On the Asset Management page, you can select one or more endpoints and clickActions > Upgrade Agent. On the Endpoint Administration page, you can select one or more agent versions and clickUpgrade. You can also schedule automatic agent upgrades using theAgent Installationspage.Reference:

Asset Management

Endpoint Administration

Agent Installations

What motivation do ransomware attackers have for returning access to systems once their victims have paid?

A.
There is organized crime governance among attackers that requires the return of access to remain in good standing
A.
There is organized crime governance among attackers that requires the return of access to remain in good standing
Answers
B.
Nation-states enforce the return of system access through the use of laws and regulation.
B.
Nation-states enforce the return of system access through the use of laws and regulation.
Answers
C.
Failure to restore access to systems undermines the scheme because others will not believe their valuables would be returned.
C.
Failure to restore access to systems undermines the scheme because others will not believe their valuables would be returned.
Answers
D.
The ransomware attackers hope to trace the financial trail back and steal more from traditional banking institutions.
D.
The ransomware attackers hope to trace the financial trail back and steal more from traditional banking institutions.
Answers
Suggested answer: C

Explanation:

Ransomware attackers have a motivation to return access to systems once their victims have paid because they want to maintain their reputation and credibility. If they fail to restore access to systems, they risk losing the trust of future victims who may not believe that paying the ransom will result in getting their data back. This would reduce the effectiveness and profitability of their scheme. Therefore, ransomware attackers have an incentive to honor their promises and decrypt the data after receiving the ransom.Reference:

What is the motivation behind ransomware? | Foresite

As Ransomware Attackers' Motives Change, So Should Your Defense - Forbes

Live Terminal uses which type of protocol to communicate with the agent on the endpoint?

A.
NetBIOS over TCP
A.
NetBIOS over TCP
Answers
B.
WebSocket
B.
WebSocket
Answers
C.
UDP and a random port
C.
UDP and a random port
Answers
D.
TCP, over port 80
D.
TCP, over port 80
Answers
Suggested answer: B

Explanation:

Live Terminal uses theWebSocketprotocol to communicate with the agent on the endpoint. WebSocket is a full-duplex communication protocol that enables bidirectional data exchange between a client and a server over a single TCP connection. WebSocket is designed to be implemented in web browsers and web servers, but it can be used by any client or server application. WebSocket provides a persistent connection between the Cortex XDR console and the endpoint, allowing you to execute commands and receive responses in real time. Live Terminal uses port 443 for WebSocket communication, which is the same port used for HTTPS traffic.Reference:

Initiate a Live Terminal Session

WebSocket

You can star security events in which two ways? (Choose two.)

A.
Create an alert-starring configuration.
A.
Create an alert-starring configuration.
Answers
B.
Create an Incident-starring configuration.
B.
Create an Incident-starring configuration.
Answers
C.
Manually star an alert.
C.
Manually star an alert.
Answers
D.
Manually star an Incident.
D.
Manually star an Incident.
Answers
Suggested answer: C, D

Explanation:

You can star security events in Cortex XDR in two ways: manually star an alert or an incident, or create an alert-starring or incident-starring configuration. Starring security events helps you prioritize and track the events that are most important to you. You can also filter and sort the events by their star status in the Cortex XDR console.

To manually star an alert or an incident, you can use the star icon in the Alerts table or the Incidents table. You can also star an alert from the Causality View or the Query Center Results table. You can star an incident from the Incident View or the Query Center Results table. You can also unstar an event by clicking the star icon again.

To create an alert-starring or incident-starring configuration, you can use the Alert Starring Configuration or the Incident Starring Configuration pages in the Cortex XDR console. You can define the criteria for starring alerts or incidents based on their severity, category, source, or other attributes. You can also enable or disable the configurations as needed.

Star Security Events

Create an Alert Starring Configuration

Create an Incident Starring Configuration

Where would you go to add an exception to exclude a specific file hash from examination by the Malware profile for a Windows endpoint?

A.
Find the Malware profile attached to the endpoint, Under Portable Executable and DLL Examination add the hash to the allow list.
A.
Find the Malware profile attached to the endpoint, Under Portable Executable and DLL Examination add the hash to the allow list.
Answers
B.
From the rules menu select new exception, fill out the criteria, choose the scope to apply it to, hit save.
B.
From the rules menu select new exception, fill out the criteria, choose the scope to apply it to, hit save.
Answers
C.
Find the exceptions profile attached to the endpoint, under process exceptions select local analysis, paste the hash and save.
C.
Find the exceptions profile attached to the endpoint, under process exceptions select local analysis, paste the hash and save.
Answers
D.
In the Action Center, choose Allow list, select new action, select add to allow list, add your hash to the list, and apply it.
D.
In the Action Center, choose Allow list, select new action, select add to allow list, add your hash to the list, and apply it.
Answers
Suggested answer: D

Explanation:

To add an exception to exclude a specific file hash from examination by the Malware profile for a Windows endpoint, you need to use the Action Center in Cortex XDR. The Action Center allows you to create and manage actions that apply to endpoints, such as adding files or processes to the allow list or block list, isolating or unisolating endpoints, or initiating live terminal sessions. To add a file hash to the allow list, you need to choose Allow list, select new action, select add to allow list, add your hash to the list, and apply it.This will prevent the Malware profile from scanning or blocking the file on the endpoints that match the scope of the action.Reference: Cortex XDR 3: Responding to Attacks1, Action Center2

Total 91 questions
Go to page: of 10