Palo Alto Networks PCDRA Practice Test - Questions Answers, Page 6
List of questions
Question 51
Where can SHA256 hash values be used in Cortex XDR Malware Protection Profiles?
Question 52
How does Cortex XDR agent for Windows prevent ransomware attacks from compromising the file system?
Question 53
What functionality of the Broker VM would you use to ingest third-party firewall logs to the Cortex Data Lake?
Question 54
In the deployment of which Broker VM applet are you required to install a strong cipher SHA256-based SSL certificate?
Question 55
When is the wss (WebSocket Secure) protocol used?
Question 56
With a Cortex XDR Prevent license, which objects are considered to be sensors?
Question 57
Which license is required when deploying Cortex XDR agent on Kubernetes Clusters as a DaemonSet?
Question 58
What kind of the threat typically encrypts user files?
Question 59
When using the ''File Search and Destroy'' feature, which of the following search hash type is supported?
Question 60
If you have an isolated network that is prevented from connecting to the Cortex Data Lake, which type of Broker VM setup can you use to facilitate the communication?
Question