ExamGecko

Palo Alto Networks PCDRA Practice Test - Questions Answers, Page 6

Question list
Search
Search

Where can SHA256 hash values be used in Cortex XDR Malware Protection Profiles?

A.
in the macOS Malware Protection Profile to indicate allowed signers
A.
in the macOS Malware Protection Profile to indicate allowed signers
Answers
B.
in the Linux Malware Protection Profile to indicate allowed Java libraries
B.
in the Linux Malware Protection Profile to indicate allowed Java libraries
Answers
C.
SHA256 hashes cannot be used in Cortex XDR Malware Protection Profiles
C.
SHA256 hashes cannot be used in Cortex XDR Malware Protection Profiles
Answers
D.
in the Windows Malware Protection Profile to indicate allowed executables
D.
in the Windows Malware Protection Profile to indicate allowed executables
Answers
Suggested answer: D

Explanation:

Cortex XDR Malware Protection Profiles allow you to configure the malware prevention settings for Windows, Linux, and macOS endpoints. You can use SHA256 hash values in the Windows Malware Protection Profile to indicate allowed executables that you want to exclude from malware scanning. This can help you reduce false positives and improve performance by skipping the scanning of known benign files. You can add up to 1000 SHA256 hash values per profile. You cannot use SHA256 hash values in the Linux or macOS Malware Protection Profiles, but you can use other criteria such as file path, file name, or signer to exclude files from scanning.Reference:

Malware Protection Profiles

Configure a Windows Malware Protection Profile

PCDRA Study Guide

How does Cortex XDR agent for Windows prevent ransomware attacks from compromising the file system?

A.
by encrypting the disk first.
A.
by encrypting the disk first.
Answers
B.
by utilizing decoy Files.
B.
by utilizing decoy Files.
Answers
C.
by retrieving the encryption key.
C.
by retrieving the encryption key.
Answers
D.
by patching vulnerable applications.
D.
by patching vulnerable applications.
Answers
Suggested answer: B

Explanation:

Cortex XDR agent for Windows prevents ransomware attacks from compromising the file system by utilizing decoy files. Decoy files are randomly generated files that are placed in strategic locations on the endpoint, such as the user's desktop, documents, and pictures folders. These files are designed to look like valuable data that ransomware would target for encryption. When Cortex XDR agent detects that a process is attempting to access or modify a decoy file, it immediately blocks the process and alerts the administrator. This way, Cortex XDR agent can stop ransomware attacks before they can cause any damage to the real files on the endpoint.Reference:

Anti-Ransomware Protection

PCDRA Study Guide

What functionality of the Broker VM would you use to ingest third-party firewall logs to the Cortex Data Lake?

A.
Netflow Collector
A.
Netflow Collector
Answers
B.
Syslog Collector
B.
Syslog Collector
Answers
C.
DB Collector
C.
DB Collector
Answers
D.
Pathfinder
D.
Pathfinder
Answers
Suggested answer: B

Explanation:

The Broker VM is a virtual machine that acts as a data broker between third-party data sources and the Cortex Data Lake. It can ingest different types of data, such as syslog, netflow, database, and pathfinder. The Syslog Collector functionality of the Broker VM allows it to receive syslog messages from third-party devices, such as firewalls, routers, switches, and servers, and forward them to the Cortex Data Lake. The Syslog Collector can be configured to filter, parse, and enrich the syslog messages before sending them to the Cortex Data Lake. The Syslog Collector can also be used to ingest logs from third-party firewall vendors, such as Cisco, Fortinet, and Check Point, to the Cortex Data Lake. This enables Cortex XDR to analyze the firewall logs and provide visibility and threat detection across the network perimeter.Reference:

Cortex XDR Data Broker VM

Syslog Collector

Supported Third-Party Firewall Vendors

In the deployment of which Broker VM applet are you required to install a strong cipher SHA256-based SSL certificate?

A.
Agent Proxy
A.
Agent Proxy
Answers
B.
Agent Installer and Content Caching
B.
Agent Installer and Content Caching
Answers
C.
Syslog Collector
C.
Syslog Collector
Answers
D.
CSV Collector
D.
CSV Collector
Answers
Suggested answer: B

Explanation:

The Agent Installer and Content Caching applet of the Broker VM is used to download and cache the Cortex XDR agent installation packages and content updates from Palo Alto Networks servers. This applet also acts as a proxy server for the Cortex XDR agents to communicate with the Cortex Data Lake and the Cortex XDR management console. To ensure secure communication between the Broker VM and the Cortex XDR agents, you are required to install a strong cipher SHA256-based SSL certificate on the Broker VM. The SSL certificate must have a common name or subject alternative name that matches the Broker VM FQDN or IP address. The SSL certificate must also be trusted by the Cortex XDR agents, either by using a certificate signed by a public CA or by manually installing the certificate on the endpoints.Reference:

Agent Installer and Content Caching

Install an SSL Certificate on the Broker VM

When is the wss (WebSocket Secure) protocol used?

A.
when the Cortex XDR agent downloads new security content
A.
when the Cortex XDR agent downloads new security content
Answers
B.
when the Cortex XDR agent uploads alert data
B.
when the Cortex XDR agent uploads alert data
Answers
C.
when the Cortex XDR agent connects to WildFire to upload files for analysis
C.
when the Cortex XDR agent connects to WildFire to upload files for analysis
Answers
D.
when the Cortex XDR agent establishes a bidirectional communication channel
D.
when the Cortex XDR agent establishes a bidirectional communication channel
Answers
Suggested answer: D

Explanation:

The WSS (WebSocket Secure) protocol is an extension of the WebSocket protocol that provides a secure communication channel over the internet. It is used to establish a persistent, full-duplex communication channel between a client (in this case, the Cortex XDR agent) and a server (such as the Cortex XDR management console or other components). The Cortex XDR agent uses the WSS protocol to establish a secure and real-time bidirectional communication channel with the Cortex XDR management console or other components in the Palo Alto Networks security ecosystem. This communication channel allows the agent to send data, such as security events, alerts, and other relevant information, to the management console, and receive commands, policy updates, and responses in return. By using the WSS protocol, the Cortex XDR agent can maintain a persistent connection with the management console, which enables timely communication of security-related information and allows for efficient incident response and remediation actions. It's important to note that the other options mentioned in the question also involve communication between the Cortex XDR agent and various components, but they do not specifically mention the use of the WSS protocol. For example:

A) The Cortex XDR agent downloading new security content typically utilizes protocols like HTTP or HTTPS.

B) When the Cortex XDR agent uploads alert data, it may use protocols like HTTP or HTTPS to transmit the data securely.

C) When the Cortex XDR agent connects to WildFire to upload files for analysis, it typically uses protocols like HTTP or HTTPS. Therefore, the correct answer is D, when the Cortex XDR agent establishes a bidirectional communication channel.Reference:

Device communication protocols -- AWS IoT Core

WebSocket -- Wikipedia

Palo Alto Networks Certified Detection and Remediation Analyst (PCDRA) -- Palo Alto Networks

[What are WebSockets? | Web Security Academy]

[Palo Alto Networks Certified Detection and Remediation Analyst PCDRA certification exam practice question and answer (Q&A) dump with detail explanation and reference available free, helpful to pass the Palo Alto Networks Certified Detection and Remediation Analyst PCDRA exam and earn Palo Alto Networks Certified Detection and Remediation Analyst PCDRA certification.]

With a Cortex XDR Prevent license, which objects are considered to be sensors?

A.
Syslog servers
A.
Syslog servers
Answers
B.
Third-Party security devices
B.
Third-Party security devices
Answers
C.
Cortex XDR agents
C.
Cortex XDR agents
Answers
D.
Palo Alto Networks Next-Generation Firewalls
D.
Palo Alto Networks Next-Generation Firewalls
Answers
Suggested answer: C

Explanation:

The objects that are considered to be sensors with a Cortex XDR Prevent license are Cortex XDR agents and Palo Alto Networks Next-Generation Firewalls. These are the two sources of data that Cortex XDR can collect and analyze for threat detection and response. Cortex XDR agents are software components that run on endpoints, such as Windows, Linux, and Mac devices, and provide protection against malware, exploits, and fileless attacks. Cortex XDR agents also collect and send endpoint data, such as process activity, network traffic, registry changes, and user actions, to the Cortex Data Lake for analysis and correlation. Palo Alto Networks Next-Generation Firewalls are network security devices that provide visibility and control over network traffic, and enforce security policies based on applications, users, and content. Next-Generation Firewalls also collect and send network data, such as firewall logs, DNS logs, HTTP headers, and WildFire verdicts, to the Cortex Data Lake for analysis and correlation. By integrating data from both Cortex XDR agents and Next-Generation Firewalls, Cortex XDR can provide a comprehensive view of the attack surface and detect threats across the network and endpoint layers.Reference:

Cortex XDR Prevent License

Cortex XDR Agent Features

Next-Generation Firewall Features

Which license is required when deploying Cortex XDR agent on Kubernetes Clusters as a DaemonSet?

A.
Cortex XDR Pro per TB
A.
Cortex XDR Pro per TB
Answers
B.
Host Insights
B.
Host Insights
Answers
C.
Cortex XDR Pro per Endpoint
C.
Cortex XDR Pro per Endpoint
Answers
D.
Cortex XDR Cloud per Host
D.
Cortex XDR Cloud per Host
Answers
Suggested answer: D

Explanation:

When deploying Cortex XDR agent on Kubernetes clusters as a DaemonSet, the license required is Cortex XDR Cloud per Host. This license allows you to protect and monitor your cloud workloads, such as Kubernetes clusters, containers, and serverless functions, using Cortex XDR. With Cortex XDR Cloud per Host license, you can deploy Cortex XDR agents as DaemonSets on your Kubernetes clusters, which ensures that every node in the cluster runs a copy of the agent. The Cortex XDR agent collects and sends data from the Kubernetes cluster, such as pod events, container logs, and network traffic, to the Cortex Data Lake for analysis and correlation. Cortex XDR can then detect and respond to threats across your cloud environment, and provide visibility and context into your cloud workloads. The Cortex XDR Cloud per Host license is based on the number of hosts that run the Cortex XDR agent, regardless of the number of containers or functions on each host. A host is defined as a virtual machine, a physical server, or a Kubernetes node that runs the Cortex XDR agent.You can read more about the Cortex XDR Cloud per Host license and how to deploy Cortex XDR agent on Kubernetes clusters here1and here2.Reference:

Cortex XDR Cloud per Host License

Deploy Cortex XDR Agent on Kubernetes Clusters as a DaemonSet

What kind of the threat typically encrypts user files?

A.
ransomware
A.
ransomware
Answers
B.
SQL injection attacks
B.
SQL injection attacks
Answers
C.
Zero-day exploits
C.
Zero-day exploits
Answers
D.
supply-chain attacks
D.
supply-chain attacks
Answers
Suggested answer: A

Explanation:

Ransomware is a type of malicious software, or malware, that encrypts user files and prevents them from accessing their data until they pay a ransom. Ransomware can affect individual users, businesses, and organizations of all kinds. Ransomware attacks can cause costly disruptions, data loss, and reputational damage. Ransomware can spread through various methods, such as phishing emails, malicious attachments, compromised websites, or network vulnerabilities. Some ransomware variants can also self-propagate and infect other devices or networks. Ransomware authors typically demand payment in cryptocurrency or other untraceable methods, and may threaten to delete or expose the encrypted data if the ransom is not paid within a certain time frame. However, paying the ransom does not guarantee that the files will be decrypted or that the attackers will not target the victim again.Therefore, the best way to protect against ransomware is to prevent infection in the first place, and to have a backup of the data in case of an attack123456

What is Ransomware? | How to Protect Against Ransomware in 2023

Ransomware - Wikipedia

What is ransomware? | Ransomware meaning | Cloudflare

What Is Ransomware? | Ransomware.org

Ransomware --- FBI

When using the ''File Search and Destroy'' feature, which of the following search hash type is supported?

A.
SHA256 hash of the file
A.
SHA256 hash of the file
Answers
B.
AES256 hash of the file
B.
AES256 hash of the file
Answers
C.
MD5 hash of the file
C.
MD5 hash of the file
Answers
D.
SHA1 hash of the file
D.
SHA1 hash of the file
Answers
Suggested answer: A

Explanation:

The File Search and Destroy feature is a capability of Cortex XDR that allows you to search for and delete malicious or unwanted files across your endpoints. You can use this feature to quickly respond to incidents, remediate threats, and enforce compliance policies. To use the File Search and Destroy feature, you need to specify the file name and the file hash of the file you want to search for and delete. The file hash is a unique identifier of the file that is generated by a cryptographic hash function. The file hash ensures that you are targeting the exact file you want, and not a file with a similar name or a different version. The File Search and Destroy feature supports the SHA256 hash type, which is a secure hash algorithm that produces a 256-bit (32-byte) hash value. The SHA256 hash type is widely used for file integrity verification and digital signatures. The File Search and Destroy feature does not support other hash types, such as AES256, MD5, or SHA1, which are either encryption algorithms or less secure hash algorithms.Therefore, the correct answer is A, SHA256 hash of the file1234

File Search and Destroy

What is a File Hash?

SHA-2 - Wikipedia

When using the ''File Search and Destroy'' feature, which of the following search hash type is supported?

If you have an isolated network that is prevented from connecting to the Cortex Data Lake, which type of Broker VM setup can you use to facilitate the communication?

A.
Broker VM Pathfinder
A.
Broker VM Pathfinder
Answers
B.
Local Agent Proxy
B.
Local Agent Proxy
Answers
C.
Local Agent Installer and Content Caching
C.
Local Agent Installer and Content Caching
Answers
D.
Broker VM Syslog Collector
D.
Broker VM Syslog Collector
Answers
Suggested answer: B

Explanation:

If you have an isolated network that is prevented from connecting to the Cortex Data Lake, you can use the Local Agent Proxy setup to facilitate the communication. The Local Agent Proxy is a type of Broker VM that acts as a proxy server for the Cortex XDR agents that are deployed on the isolated network. The Local Agent Proxy enables the Cortex XDR agents to communicate securely with the Cortex Data Lake and the Cortex XDR management console over the internet, without requiring direct access to the internet from the isolated network. The Local Agent Proxy also allows the Cortex XDR agents to download installation packages and content updates from the Cortex XDR management console. To use the Local Agent Proxy setup, you need to deploy a Broker VM on the isolated network and configure it as a Local Agent Proxy. You also need to deploy another Broker VM on a network that has internet access and configure it as a Remote Agent Proxy. The Remote Agent Proxy acts as a relay between the Local Agent Proxy and the Cortex Data Lake. You also need to install a strong cipher SHA256-based SSL certificate on both the Local Agent Proxy and the Remote Agent Proxy to ensure secure communication.You can read more about the Local Agent Proxy setup and how to configure it here1and here2.Reference:

Local Agent Proxy

Configure the Local Agent Proxy Setup

Total 91 questions
Go to page: of 10