Palo Alto Networks PCDRA Practice Test - Questions Answers, Page 6
List of questions
Question 51

Where can SHA256 hash values be used in Cortex XDR Malware Protection Profiles?
Question 52

How does Cortex XDR agent for Windows prevent ransomware attacks from compromising the file system?
Question 53

What functionality of the Broker VM would you use to ingest third-party firewall logs to the Cortex Data Lake?
Question 54

In the deployment of which Broker VM applet are you required to install a strong cipher SHA256-based SSL certificate?
Question 55

When is the wss (WebSocket Secure) protocol used?
Question 56

With a Cortex XDR Prevent license, which objects are considered to be sensors?
Question 57

Which license is required when deploying Cortex XDR agent on Kubernetes Clusters as a DaemonSet?
Question 58

What kind of the threat typically encrypts user files?
Question 59

When using the ''File Search and Destroy'' feature, which of the following search hash type is supported?
Question 60

If you have an isolated network that is prevented from connecting to the Cortex Data Lake, which type of Broker VM setup can you use to facilitate the communication?
Question