Palo Alto Networks PCDRA Practice Test - Questions Answers, Page 3
 Add to Whishlist
 
                            Add to Whishlist
                        List of questions
Question 21
 
                            
                            
                                As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to open a malicious Word document. You learn from the WildFire report and AutoFocus that this document is known to have been used in Phishing campaigns since 2018. What steps can you take to ensure that the same document is not opened by other users in your organization protected by the Cortex XDR agent?
Question 22
 
                            
                            
                                What types of actions you can execute with live terminal session?
Question 23
 
                            
                            
                                Which version of python is used in live terminal?
Question 24
 
                            
                            
                                What kind of malware uses encryption, data theft, denial of service, and possibly harassment to take advantage of a victim?
Question 25
 
                            
                            
                                Which function describes the removal of a specific file from its location on a local or removable drive to a protected folder to prevent the file from being executed?
Question 26
 
                            
                            
                                A Linux endpoint with a Cortex XDR Pro per Endpoint license and Enhanced Endpoint Data enabled has reported malicious activity, resulting in the creation of a file that you wish to delete. Which action could you take to delete the file?
Question 27
 
                            
                            
                                Which of the following best defines the Windows Registry as used by the Cortex XDR agent?
Question 28
 
                            
                            
                                Which statement best describes how Behavioral Threat Protection (BTP) works?
Question 29
 
                            
                            
                                Which of the following policy exceptions applies to the following description?
'An exception allowing specific PHP files'
Question 30
 
                            
                            
                                When reaching out to TAC for additional technical support related to a Security Event; what are two critical pieces of information you need to collect from the Agent? (Choose Two)
 
         Unlock Premium Member
  Unlock Premium Member
                                    

 
  
                                            
Question