ExamGecko

Palo Alto Networks PCDRA Practice Test - Questions Answers, Page 3

Question list
Search
Search

As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to open a malicious Word document. You learn from the WildFire report and AutoFocus that this document is known to have been used in Phishing campaigns since 2018. What steps can you take to ensure that the same document is not opened by other users in your organization protected by the Cortex XDR agent?

A.
Enable DLL Protection on all endpoints but there might be some false positives.
A.
Enable DLL Protection on all endpoints but there might be some false positives.
Answers
B.
Create Behavioral Threat Protection (BTP) rules to recognize and prevent the activity.
B.
Create Behavioral Threat Protection (BTP) rules to recognize and prevent the activity.
Answers
C.
No step is required because Cortex shares IOCs with our fellow Cyber Threat Alliance members.
C.
No step is required because Cortex shares IOCs with our fellow Cyber Threat Alliance members.
Answers
D.
No step is required because the malicious document is already stopped.
D.
No step is required because the malicious document is already stopped.
Answers
Suggested answer: B

Explanation:

The correct answer is B, create Behavioral Threat Protection (BTP) rules to recognize and prevent the activity. BTP rules are a powerful feature of Cortex XDR that allow you to define custom rules to detect and block malicious behaviors on endpoints. You can use BTP rules to create indicators of compromise (IOCs) based on file attributes, registry keys, processes, network connections, and other criteria. By creating BTP rules, you can prevent the same malicious Word document from being opened by other users in your organization, even if the document has a different name or hash value. BTP rules are updated through content updates and can be managed from the Cortex XDR console.

The other options are incorrect for the following reasons:

A is incorrect because enabling DLL Protection on all endpoints is not a specific or effective way to prevent the malicious Word document. DLL Protection is a feature of Cortex XDR that prevents the loading of unsigned or untrusted DLLs by protected processes. However, this feature does not apply to Word documents or macros, and may cause false positives or compatibility issues with legitimate applications.

C is incorrect because relying on Cortex to share IOCs with the Cyber Threat Alliance members is not a proactive or sufficient way to prevent the malicious Word document. The Cyber Threat Alliance is a group of cybersecurity vendors that share threat intelligence and best practices to improve their products and services. However, not all vendors are members of the alliance, and not all IOCs are shared or updated in a timely manner. Therefore, you cannot assume that other users in your organization are protected by the same IOCs as Cortex XDR.

D is incorrect because doing nothing is not a responsible or secure way to prevent the malicious Word document. Even though Cortex XDR agent prevented the attempt to open the document on one endpoint, it does not mean that the document is no longer a threat. The document may still be circulating in your network or email system, and may be opened by other users who have different agent profiles or policies. Therefore, you should take steps to identify and block the document across your organization.

Cortex XDR Agent Administrator Guide: Behavioral Threat Protection

Cortex XDR Agent Administrator Guide: DLL Protection

Palo Alto Networks: Cyber Threat Alliance

What types of actions you can execute with live terminal session?

A.
Manage Network configurations, Quarantine Files, Run PowerShell scripts
A.
Manage Network configurations, Quarantine Files, Run PowerShell scripts
Answers
B.
Manage Processes, Manage Files, Run Operating System Commands, Run Ruby Commands and Scripts
B.
Manage Processes, Manage Files, Run Operating System Commands, Run Ruby Commands and Scripts
Answers
C.
Apply patches, Reboot System, send notification for end user, Run Python Commands and Scripts
C.
Apply patches, Reboot System, send notification for end user, Run Python Commands and Scripts
Answers
D.
Manage Processes, Manage Files, Run Operating System Commands, Run Python Commands and Scripts
D.
Manage Processes, Manage Files, Run Operating System Commands, Run Python Commands and Scripts
Answers
Suggested answer: D

Explanation:

Live terminal session is a feature of Cortex XDR that allows you to remotely access and control endpoints from the Cortex XDR console. With live terminal session, you can execute various actions on the endpoints, such as:

Manage Processes: You can view, start, or kill processes on the endpoint, and monitor their CPU and memory usage.

Manage Files: You can view, create, delete, or move files and folders on the endpoint, and upload or download files to or from the endpoint.

Run Operating System Commands: You can run commands on the endpoint using the native command-line interface of the operating system, such as cmd.exe for Windows, bash for Linux, or zsh for macOS.

Run Python Commands and Scripts: You can run Python commands and scripts on the endpoint using the Python interpreter embedded in the Cortex XDR agent. You can use the Python commands and scripts to perform advanced tasks or automation on the endpoint.

Initiate a Live Terminal Session

Manage Processes

Manage Files

Run Operating System Commands

Run Python Commands and Scripts

Which version of python is used in live terminal?

A.
Python 2 and 3 with standard Python libraries
A.
Python 2 and 3 with standard Python libraries
Answers
B.
Python 2 and 3 with specific XDR Python libraries developed by Palo Alto Networks
B.
Python 2 and 3 with specific XDR Python libraries developed by Palo Alto Networks
Answers
C.
Python 3 with specific XDR Python libraries developed by Palo Alto Networks
C.
Python 3 with specific XDR Python libraries developed by Palo Alto Networks
Answers
D.
Python 3 with standard Python libraries
D.
Python 3 with standard Python libraries
Answers
Suggested answer: D

Explanation:

Live terminal uses Python 3 with standard Python libraries to run Python commands and scripts on the endpoint. Live terminal does not support Python 2 or any custom or external Python libraries. Live terminal uses the Python interpreter embedded in the Cortex XDR agent, which is based on Python 3.7.4. The standard Python libraries are the modules that are included with the Python installation and provide a wide range of functionalities, such as operating system interfaces, network programming, data processing, and more. You can use the Python commands and scripts to perform advanced tasks or automation on the endpoint, such as querying system information, modifying files or registry keys, or running other applications.Reference:

Run Python Commands and Scripts

Python Standard Library

What kind of malware uses encryption, data theft, denial of service, and possibly harassment to take advantage of a victim?

A.
Ransomware
A.
Ransomware
Answers
B.
Worm
B.
Worm
Answers
C.
Keylogger
C.
Keylogger
Answers
D.
Rootkit
D.
Rootkit
Answers
Suggested answer: A

Explanation:

The kind of malware that uses encryption, data theft, denial of service, and possibly harassment to take advantage of a victim isransomware. Ransomware is a type of malware that encrypts the victim's files or blocks access to their system, and then demands a ransom for the decryption key or the restoration of access. Ransomware can also threaten to expose or delete the victim's data if the ransom is not paid. Ransomware can cause significant damage and disruption to individuals, businesses, and organizations, and can be difficult to remove or recover from. Some examples of ransomware are CryptoLocker, WannaCry, Ryuk, and REvil.

12 Types of Malware + Examples That You Should Know - CrowdStrike

What is Malware? Malware Definition, Types and Protection

12+ Types of Malware Explained with Examples (Complete List)

Which function describes the removal of a specific file from its location on a local or removable drive to a protected folder to prevent the file from being executed?

A.
Search & destroy
A.
Search & destroy
Answers
B.
Isolation
B.
Isolation
Answers
C.
Quarantine
C.
Quarantine
Answers
D.
Flag for removal
D.
Flag for removal
Answers
Suggested answer: C

Explanation:

The function that describes the removal of a specific file from its location on a local or removable drive to a protected folder to prevent the file from being executed isquarantine. Quarantine is a feature of Cortex XDR that allows you to isolate malicious or suspicious files from the endpoint and prevent them from running or spreading. You can quarantine files manually from the Cortex XDR console, or automatically based on the malware analysis profile or the remediation suggestions. When you quarantine a file, the Cortex XDR agent encrypts the file and moves it to a hidden folder under the agent installation directory. The file is also renamed with a random string and a .quarantine extension. You can view, restore, or delete the quarantined files from the Cortex XDR console.Reference:

Quarantine Files

Manage Quarantined Files

A Linux endpoint with a Cortex XDR Pro per Endpoint license and Enhanced Endpoint Data enabled has reported malicious activity, resulting in the creation of a file that you wish to delete. Which action could you take to delete the file?

A.
Manually remediate the problem on the endpoint in question.
A.
Manually remediate the problem on the endpoint in question.
Answers
B.
Open X2go from the Cortex XDR console and delete the file via X2go.
B.
Open X2go from the Cortex XDR console and delete the file via X2go.
Answers
C.
Initiate Remediate Suggestions to automatically delete the file.
C.
Initiate Remediate Suggestions to automatically delete the file.
Answers
D.
Open an NFS connection from the Cortex XDR console and delete the file.
D.
Open an NFS connection from the Cortex XDR console and delete the file.
Answers
Suggested answer: C

Explanation:

The best action to delete the file on the Linux endpoint is to initiate Remediation Suggestions from the Cortex XDR console. Remediation Suggestions are a feature of Cortex XDR that provide you with recommended actions to undo the effects of malicious activity on your endpoints. You can view the remediation suggestions for each alert or incident in the Cortex XDR console, and decide whether to apply them or not. Remediation Suggestions can help you restore the endpoint to its original state, remove malicious files or processes, or fix registry or system settings. Remediation Suggestions are based on the forensic data collected by the Cortex XDR agent and the analysis performed by Cortex XDR.

The other options are incorrect for the following reasons:

A is incorrect because manually remediating the problem on the endpoint is not a convenient or efficient way to delete the file. Manually remediating the problem would require you to access the endpoint directly, log in as root, locate the file, and delete it. This would also require you to have the necessary permissions and credentials to access the endpoint, and to know the exact path and name of the file. Manually remediating the problem would also not provide you with any audit trail or confirmation of the deletion.

B is incorrect because opening X2go from the Cortex XDR console is not a supported or secure way to delete the file. X2go is a third-party remote desktop software that allows you to access Linux endpoints from a graphical user interface. However, X2go is not integrated with Cortex XDR, and using it would require you to install and configure it on both the Cortex XDR console and the endpoint. Using X2go would also expose the endpoint to potential network attacks or unauthorized access, and would not provide you with any audit trail or confirmation of the deletion.

D is incorrect because opening an NFS connection from the Cortex XDR console is not a feasible or reliable way to delete the file. NFS is a network file system protocol that allows you to access files on remote servers as if they were local. However, NFS is not integrated with Cortex XDR, and using it would require you to set up and maintain an NFS server and client on both the Cortex XDR console and the endpoint. Using NFS would also depend on the network availability and performance, and would not provide you with any audit trail or confirmation of the deletion.

Remediation Suggestions

Apply Remediation Suggestions

Which of the following best defines the Windows Registry as used by the Cortex XDR agent?

A.
a hierarchical database that stores settings for the operating system and for applications
A.
a hierarchical database that stores settings for the operating system and for applications
Answers
B.
a system of files used by the operating system to commit memory that exceeds the available hardware resources. Also known as the ''swap''
B.
a system of files used by the operating system to commit memory that exceeds the available hardware resources. Also known as the ''swap''
Answers
C.
a central system, available via the internet, for registering officially licensed versions of software to prove ownership
C.
a central system, available via the internet, for registering officially licensed versions of software to prove ownership
Answers
D.
a ledger for maintaining accurate and up-to-date information on total disk usage and disk space remaining available to the operating system
D.
a ledger for maintaining accurate and up-to-date information on total disk usage and disk space remaining available to the operating system
Answers
Suggested answer: A

Explanation:

The Windows Registry is a hierarchical database that stores settings for the operating system and for applications that run on Windows. The registry contains information, settings, options, and other values for programs and hardware installed on all versions of Microsoft Windows operating systems. The registry is organized into five main sections, called hives, each of which contains keys, subkeys, and values. The Cortex XDR agent uses the registry to store its configuration, status, and logs, as well as to monitor and control the endpoint's security features. The Cortex XDR agent also allows you to run scripts that can read, write, or delete registry keys and values on the endpoint.Reference:

Windows Registry - Wikipedia

Registry Operations

Which statement best describes how Behavioral Threat Protection (BTP) works?

A.
BTP injects into known vulnerable processes to detect malicious activity.
A.
BTP injects into known vulnerable processes to detect malicious activity.
Answers
B.
BTP runs on the Cortex XDR and distributes behavioral signatures to all agents.
B.
BTP runs on the Cortex XDR and distributes behavioral signatures to all agents.
Answers
C.
BTP matches EDR data with rules provided by Cortex XDR.
C.
BTP matches EDR data with rules provided by Cortex XDR.
Answers
D.
BTP uses machine Learning to recognize malicious activity even if it is not known.
D.
BTP uses machine Learning to recognize malicious activity even if it is not known.
Answers
Suggested answer: D

Explanation:

The statement that best describes how Behavioral Threat Protection (BTP) works is D, BTP uses machine learning to recognize malicious activity even if it is not known. BTP is a feature of Cortex XDR that allows you to define custom rules to detect and block malicious behaviors on endpoints. BTP uses machine learning to profile behavior and detect anomalies indicative of attack. BTP can recognize malicious activity based on file attributes, registry keys, processes, network connections, and other criteria, even if the activity is not associated with any known malware or threat. BTP rules are updated through content updates and can be managed from the Cortex XDR console.

The other statements are incorrect for the following reasons:

A is incorrect because BTP does not inject into known vulnerable processes to detect malicious activity. BTP does not rely on process injection, which is a technique used by some malware to hide or execute code within another process. BTP monitors the behavior of all processes on the endpoint, regardless of their vulnerability status, and compares them with the BTP rules.

B is incorrect because BTP does not run on the Cortex XDR and distribute behavioral signatures to all agents. BTP runs on the Cortex XDR agent, which is installed on the endpoint, and analyzes the endpoint data locally. BTP does not use behavioral signatures, which are predefined patterns of malicious behavior, but rather uses machine learning to identify anomalies and deviations from normal behavior.

C is incorrect because BTP does not match EDR data with rules provided by Cortex XDR. BTP is part of the EDR (Endpoint Detection and Response) capabilities of Cortex XDR, and uses the EDR data collected by the Cortex XDR agent to perform behavioral analysis. BTP does not match the EDR data with rules provided by Cortex XDR, but rather applies the BTP rules defined by the Cortex XDR administrator or the Palo Alto Networks threat research team.

Cortex XDR Agent Administrator Guide: Behavioral Threat Protection

Cortex XDR: Stop Breaches with AI-Powered Cybersecurity

Which of the following policy exceptions applies to the following description?

'An exception allowing specific PHP files'

A.
Support exception
A.
Support exception
Answers
B.
Local file threat examination exception
B.
Local file threat examination exception
Answers
C.
Behavioral threat protection rule exception
C.
Behavioral threat protection rule exception
Answers
D.
Process exception
D.
Process exception
Answers
Suggested answer: B

Explanation:

The policy exception that applies to the following description is B, local file threat examination exception. A local file threat examination exception is an exception that allows you to exclude specific files or folders from being scanned by the Cortex XDR agent for malware or threats. You can use this exception to prevent false positives, performance issues, or compatibility problems with legitimate files or applications. You can define the local file threat examination exception by file name, file path, file hash, or digital signer. For example, you can create a local file threat examination exception for specific PHP files by entering their file names or paths in the exception configuration.Reference:

Local File Threat Examination Exceptions

Create a Local File Threat Examination Exception

When reaching out to TAC for additional technical support related to a Security Event; what are two critical pieces of information you need to collect from the Agent? (Choose Two)

A.
The agent technical support file.
A.
The agent technical support file.
Answers
B.
The prevention archive from the alert.
B.
The prevention archive from the alert.
Answers
C.
The distribution id of the agent.
C.
The distribution id of the agent.
Answers
D.
A list of all the current exceptions applied to the agent.
D.
A list of all the current exceptions applied to the agent.
Answers
E.
The unique agent id.
E.
The unique agent id.
Answers
Suggested answer: A, B

Explanation:

When reaching out to TAC for additional technical support related to a security event, two critical pieces of information you need to collect from the agent are:

The agent technical support file. This is a file that contains diagnostic information about the agent, such as its configuration, status, logs, and system information. The agent technical support file can help TAC troubleshoot and resolve issues with the agent or the endpoint. You can generate and download the agent technical support file from the Cortex XDR console, or from the agent itself.

The prevention archive from the alert. This is a file that contains forensic data related to the alert, such as the process tree, the network activity, the registry changes, and the files involved. The prevention archive can help TAC analyze and understand the alert and the malicious activity. You can generate and download the prevention archive from the Cortex XDR console, or from the agent itself.

The other options are not critical pieces of information for TAC, and may not be available or relevant for every security event. For example:

The distribution id of the agent is a unique identifier that is assigned to the agent when it is installed on the endpoint. The distribution id can help TAC identify the agent and its profile, but it is not sufficient to provide technical support or forensic analysis. The distribution id can be found in the Cortex XDR console, or in the agent installation folder.

A list of all the current exceptions applied to the agent is a set of rules that define the files, processes, or behaviors that are excluded from the agent's security policies. The exceptions can help TAC understand the agent's configuration and behavior, but they are not essential to provide technical support or forensic analysis. The exceptions can be found in the Cortex XDR console, or in the agent configuration file.

The unique agent id is a unique identifier that is assigned to the agent when it registers with Cortex XDR. The unique agent id can help TAC identify the agent and its endpoint, but it is not sufficient to provide technical support or forensic analysis. The unique agent id can be found in the Cortex XDR console, or in the agent log file.

Generate and Download the Agent Technical Support File

Generate and Download the Prevention Archive

Cortex XDR Agent Administrator Guide: Agent Distribution ID

Cortex XDR Agent Administrator Guide: Exception Security Profiles

[Cortex XDR Agent Administrator Guide: Unique Agent ID]

Total 91 questions
Go to page: of 10