ExamGecko

Palo Alto Networks PCDRA Practice Test - Questions Answers, Page 8

Question list
Search
Search

While working the alerts involved in a Cortex XDR incident, an analyst has found that every alert in this incident requires an exclusion. What will the Cortex XDR console automatically do to this incident if all alerts contained have exclusions?

A.
mark the incident as Unresolved
A.
mark the incident as Unresolved
Answers
B.
create a BIOC rule excluding this behavior
B.
create a BIOC rule excluding this behavior
Answers
C.
create an exception to prevent future false positives
C.
create an exception to prevent future false positives
Answers
D.
mark the incident as Resolved -- False Positive
D.
mark the incident as Resolved -- False Positive
Answers
Suggested answer: D

Explanation:

If all alerts contained in a Cortex XDR incident have exclusions, the Cortex XDR console will automatically mark the incident as Resolved -- False Positive. This means that the incident was not a real threat, but a benign or legitimate activity that triggered an alert. By marking the incident as Resolved -- False Positive, the Cortex XDR console removes the incident from the list of unresolved incidents and does not count it towards the incident statistics.This helps the analyst to focus on the true positive incidents that require further investigation and response1.

An exclusion is a rule that hides an alert from the Cortex XDR console, based on certain criteria, such as the alert source, type, severity, or description. An exclusion does not change the security policy or prevent the alert from firing, it only suppresses the alert from the console.An exclusion is useful when the analyst wants to reduce the noise of false positive alerts that are not relevant or important2.

An exception, on the other hand, is a rule that overrides the security policy and allows or blocks a process or file from running on an endpoint, based on certain attributes, such as the file hash, path, name, or signer.An exception is useful when the analyst wants to prevent false negative alerts that are caused by malicious or unwanted files or processes that are not detected by the security policy3.

A BIOC rule is a rule that creates an alert based on a custom XQL query that defines a specific behavior of interest or concern.A BIOC rule is useful when the analyst wants to detect and alert on anomalous or suspicious activities that are not covered by the default Cortex XDR rules4.

Palo Alto Networks Cortex XDR Documentation, Resolve an Incident1

Palo Alto Networks Cortex XDR Documentation, Alert Exclusions2

Palo Alto Networks Cortex XDR Documentation, Exceptions3

Palo Alto Networks Cortex XDR Documentation, BIOC Rules4

Network attacks follow predictable patterns. If you interfere with any portion of this pattern, the attack will be neutralized. Which of the following statements is correct?

A.
Cortex XDR Analytics allows to interfere with the pattern as soon as it is observed on the firewall.
A.
Cortex XDR Analytics allows to interfere with the pattern as soon as it is observed on the firewall.
Answers
B.
Cortex XDR Analytics does not interfere with the pattern as soon as it is observed on the endpoint.
B.
Cortex XDR Analytics does not interfere with the pattern as soon as it is observed on the endpoint.
Answers
C.
Cortex XDR Analytics does not have to interfere with the pattern as soon as it is observed on the endpoint in order to prevent the attack.
C.
Cortex XDR Analytics does not have to interfere with the pattern as soon as it is observed on the endpoint in order to prevent the attack.
Answers
D.
Cortex XDR Analytics allows to interfere with the pattern as soon as it is observed on the endpoint.
D.
Cortex XDR Analytics allows to interfere with the pattern as soon as it is observed on the endpoint.
Answers
Suggested answer: D

Explanation:

Cortex XDR Analytics is a cloud-based service that uses machine learning and artificial intelligence to detect and prevent network attacks. Cortex XDR Analytics can interfere with the attack pattern as soon as it is observed on the endpoint by applying protection policies that block malicious processes, files, or network connections. This way, Cortex XDR Analytics can stop the attack before it causes any damage or compromises the system.Reference:

[Cortex XDR Analytics Overview]

[Cortex XDR Analytics Protection Policies]

After scan, how does file quarantine function work on an endpoint?

A.
Quarantine takes ownership of the files and folders and prevents execution through access control.
A.
Quarantine takes ownership of the files and folders and prevents execution through access control.
Answers
B.
Quarantine disables the network adapters and locks down access preventing any communications with the endpoint.
B.
Quarantine disables the network adapters and locks down access preventing any communications with the endpoint.
Answers
C.
Quarantine removes a specific file from its location on a local or removable drive to a protected folder and prevents it from being executed.
C.
Quarantine removes a specific file from its location on a local or removable drive to a protected folder and prevents it from being executed.
Answers
D.
Quarantine prevents an endpoint from communicating with anything besides the listed exceptions in the agent profile and Cortex XDR.
D.
Quarantine prevents an endpoint from communicating with anything besides the listed exceptions in the agent profile and Cortex XDR.
Answers
Suggested answer: C

Explanation:

Quarantine is a feature of Cortex XDR that allows you to isolate a malicious file from its original location and prevent it from being executed. Quarantine works by moving the file to a protected folder on the endpoint and changing its permissions and attributes. Quarantine can be applied to files detected by periodic scans or by behavioral threat protection (BTP) rules. Quarantine is only supported for portable executable (PE) and dynamic link library (DLL) files. Quarantine does not affect the network connectivity or the communication of the endpoint with Cortex XDR.Reference:

Quarantine Malicious Files

Manage Quarantined Files

Which two types of exception profiles you can create in Cortex XDR? (Choose two.)

A.
exception profiles that apply to specific endpoints
A.
exception profiles that apply to specific endpoints
Answers
B.
agent exception profiles that apply to specific endpoints
B.
agent exception profiles that apply to specific endpoints
Answers
C.
global exception profiles that apply to all endpoints
C.
global exception profiles that apply to all endpoints
Answers
D.
role-based profiles that apply to specific endpoints
D.
role-based profiles that apply to specific endpoints
Answers
Suggested answer: B, C

Explanation:

Cortex XDR allows you to create two types of exception profiles: agent exception profiles and global exception profiles. Agent exception profiles apply to specific endpoints that are assigned to the profile. Global exception profiles apply to all endpoints in your network. You can use exception profiles to configure different types of exceptions, such as process exceptions, support exceptions, behavioral threat protection rule exceptions, local analysis rules exceptions, advanced analysis exceptions, or digital signer exceptions. Exception profiles help you fine-tune the security policies for your endpoints and reduce false positives.Reference:

Exception Security Profiles

Create an Agent Exception Profile

Create a Global Exception Profile

To stop a network-based attack, any interference with a portion of the attack pattern is enough to prevent it from succeeding. Which statement is correct regarding the Cortex XDR Analytics module?

A.
It does not interfere with any portion of the pattern on the endpoint.
A.
It does not interfere with any portion of the pattern on the endpoint.
Answers
B.
It interferes with the pattern as soon as it is observed by the firewall.
B.
It interferes with the pattern as soon as it is observed by the firewall.
Answers
C.
It does not need to interfere with the any portion of the pattern to prevent the attack.
C.
It does not need to interfere with the any portion of the pattern to prevent the attack.
Answers
D.
It interferes with the pattern as soon as it is observed on the endpoint.
D.
It interferes with the pattern as soon as it is observed on the endpoint.
Answers
Suggested answer: D

Explanation:

The correct statement regarding the Cortex XDR Analytics module is D, it interferes with the pattern as soon as it is observed on the endpoint. The Cortex XDR Analytics module is a feature of Cortex XDR that uses machine learning and behavioral analytics to detect and prevent network-based attacks on endpoints. The Cortex XDR Analytics module analyzes the network traffic and activity on the endpoint, and compares it with the attack patterns defined by Palo Alto Networks threat research team. The Cortex XDR Analytics module interferes with the attack pattern as soon as it is observed on the endpoint, by blocking the malicious network connection, process, or file. This way, the Cortex XDR Analytics module can stop the attack before it causes any damage or compromise.

The other statements are incorrect for the following reasons:

A is incorrect because the Cortex XDR Analytics module does interfere with the attack pattern on the endpoint, by blocking the malicious network connection, process, or file. The Cortex XDR Analytics module does not rely on the firewall or any other network device to stop the attack, but rather uses the Cortex XDR agent installed on the endpoint to perform the interference.

B is incorrect because the Cortex XDR Analytics module does not interfere with the attack pattern as soon as it is observed by the firewall. The Cortex XDR Analytics module does not depend on the firewall or any other network device to detect or prevent the attack, but rather uses the Cortex XDR agent installed on the endpoint to perform the analysis and interference. The firewall may not be able to observe or block the attack pattern if it is encrypted, obfuscated, or bypassed by the attacker.

C is incorrect because the Cortex XDR Analytics module does need to interfere with the attack pattern to prevent the attack. The Cortex XDR Analytics module does not only detect the attack pattern, but also prevents it from succeeding by blocking the malicious network connection, process, or file. The Cortex XDR Analytics module does not rely on any other response mechanism or human intervention to stop the attack, but rather uses the Cortex XDR agent installed on the endpoint to perform the interference.

Cortex XDR Analytics Module

Cortex XDR Analytics Module Detection and Prevention

Cortex XDR is deployed in the enterprise and you notice a cobalt strike attack via an ongoing supply chain compromise was prevented on 1 server. What steps can you take to ensure the same protection is extended to all your servers?

A.
Conduct a thorough Endpoint Malware scan.
A.
Conduct a thorough Endpoint Malware scan.
Answers
B.
Enable DLL Protection on all servers but there might be some false positives.
B.
Enable DLL Protection on all servers but there might be some false positives.
Answers
C.
Enable Behavioral Threat Protection (BTP) with cytool to prevent the attack from spreading.
C.
Enable Behavioral Threat Protection (BTP) with cytool to prevent the attack from spreading.
Answers
D.
Create lOCs of the malicious files you have found to prevent their execution.
D.
Create lOCs of the malicious files you have found to prevent their execution.
Answers
Suggested answer: D

Explanation:

The best step to ensure the same protection is extended to all your servers is to create indicators of compromise (IOCs) of the malicious files you have found to prevent their execution. IOCs are pieces of information that indicate a potential threat or compromise on an endpoint, such as file hashes, IP addresses, domain names, or registry keys. You can create IOCs in Cortex XDR to block or alert on any file or network activity that matches the IOCs. By creating IOCs of the malicious files involved in the cobalt strike attack, you can prevent them from running or spreading on any of your servers.

The other options are not the best steps for the following reasons:

A is not the best step because conducting a thorough Endpoint Malware scan may not detect or prevent the cobalt strike attack if the malicious files are obfuscated, encrypted, or hidden. Endpoint Malware scan is a feature of Cortex XDR that allows you to scan endpoints for known malware and quarantine any malicious files found. However, Endpoint Malware scan may not be effective against unknown or advanced threats that use evasion techniques to avoid detection.

B is not the best step because enabling DLL Protection on all servers may cause some false positives and disrupt legitimate applications. DLL Protection is a feature of Cortex XDR that allows you to block or alert on any DLL loading activity that matches certain criteria, such as unsigned DLLs, DLLs loaded from network locations, or DLLs loaded by specific processes. However, DLL Protection may also block or alert on benign DLL loading activity that is part of normal system or application operations, resulting in false positives and performance issues.

C is not the best step because enabling Behavioral Threat Protection (BTP) with cytool may not prevent the attack from spreading if the malicious files are already on the endpoints or if the attack uses other methods to evade detection. Behavioral Threat Protection is a feature of Cortex XDR that allows you to block or alert on any endpoint behavior that matches certain patterns, such as ransomware, credential theft, or lateral movement. Cytool is a command-line tool that allows you to configure and manage the Cortex XDR agent on the endpoint. However, Behavioral Threat Protection may not prevent the attack from spreading if the malicious files are already on the endpoints or if the attack uses other methods to evade detection, such as encryption, obfuscation, or proxy servers.

Create IOCs

Scan an Endpoint for Malware

DLL Protection

Behavioral Threat Protection

Cytool for Windows

What is the difference between presets and datasets in XQL?

A.
A dataset is a Cortex data lake data source only; presets are built-in data source.
A.
A dataset is a Cortex data lake data source only; presets are built-in data source.
Answers
B.
A dataset is a built-in or third-party source; presets group XDR data fields.
B.
A dataset is a built-in or third-party source; presets group XDR data fields.
Answers
C.
A dataset is a database; presets is a field.
C.
A dataset is a database; presets is a field.
Answers
D.
A dataset is a third-party data source; presets are built-in data source.
D.
A dataset is a third-party data source; presets are built-in data source.
Answers
Suggested answer: B

Explanation:

The difference between presets and datasets in XQL is that a dataset is a built-in or third-party data source, while a preset is a group of XDR data fields. A dataset is a collection of data that you can query and analyze using XQL. A dataset can be a Cortex data lake data source, such as endpoints, alerts, incidents, or network flows, or a third-party data source, such as AWS CloudTrail, Azure Activity Logs, or Google Cloud Audit Logs. A preset is a predefined set of XDR data fields that are relevant for a specific use case, such as process execution, file operations, or network activity. A preset can help you simplify and standardize your XQL queries by selecting the most important fields for your analysis. You can use presets with any Cortex data lake data source, but not with third-party data sources.Reference:

Datasets and Presets

XQL Language Reference

What should you do to automatically convert leads into alerts after investigating a lead?

A.
Lead threats can't be prevented in the future because they already exist in the environment.
A.
Lead threats can't be prevented in the future because they already exist in the environment.
Answers
B.
Create IOC rules based on the set of the collected attribute-value pairs over the affected entities concluded during the lead hunting.
B.
Create IOC rules based on the set of the collected attribute-value pairs over the affected entities concluded during the lead hunting.
Answers
C.
Create BIOC rules based on the set of the collected attribute-value pairs over the affected entities concluded during the lead hunting.
C.
Create BIOC rules based on the set of the collected attribute-value pairs over the affected entities concluded during the lead hunting.
Answers
D.
Build a search query using Query Builder or XQL using a list of lOCs.
D.
Build a search query using Query Builder or XQL using a list of lOCs.
Answers
Suggested answer: B

Explanation:

To automatically convert leads into alerts after investigating a lead, you should create IOC rules based on the set of the collected attribute-value pairs over the affected entities concluded during the lead hunting. IOC rules are used to detect known threats based on indicators of compromise (IOCs) such as file hashes, IP addresses, domain names, etc. By creating IOC rules from the leads, you can prevent future occurrences of the same threats and generate alerts for them.Reference:

PCDRA Study Guide, page 25

Cortex XDR 3: Handling Cortex XDR Alerts, section 3.2

Cortex XDR Documentation, section ''Create IOC Rules''

Which type of IOC can you define in Cortex XDR?

A.
Destination IP Address
A.
Destination IP Address
Answers
B.
Source IP Address
B.
Source IP Address
Answers
C.
Source port
C.
Source port
Answers
D.
Destination IP Address: Destination
D.
Destination IP Address: Destination
Answers
Suggested answer: A

Explanation:

Cortex XDR allows you to define IOC rules based on various types of indicators of compromise (IOC) that you can use to detect and respond to threats in your network. One of the types of IOC that you can define in Cortex XDR isdestination IP address, which is the IP address of the remote host that a local endpoint is communicating with. You can use this type of IOC to identify malicious network activity, such as connections to command and control servers, phishing sites, or malware distribution hosts. You can also specify the direction of the network traffic (inbound or outbound) and the protocol (TCP or UDP) for the destination IP address IOC.Reference:

Cortex XDR documentation portal

Is there a possibility to create an IOC list to employ it in a query?

Cortex XDR Datasheet

Under which conditions is Local Analysis evoked to evaluate a file before the file is allowed to run?

A.
The endpoint is disconnected or the verdict from WildFire is of a type benign.
A.
The endpoint is disconnected or the verdict from WildFire is of a type benign.
Answers
B.
The endpoint is disconnected or the verdict from WildFire is of a type unknown.
B.
The endpoint is disconnected or the verdict from WildFire is of a type unknown.
Answers
C.
The endpoint is disconnected or the verdict from WildFire is of a type malware.
C.
The endpoint is disconnected or the verdict from WildFire is of a type malware.
Answers
D.
The endpoint is disconnected or the verdict from WildFire is of a type grayware.
D.
The endpoint is disconnected or the verdict from WildFire is of a type grayware.
Answers
Suggested answer: B

Explanation:

Local Analysis is a feature of Cortex XDR that allows the agent to evaluate files locally on the endpoint, without sending them to WildFire for analysis. Local Analysis is evoked when the following conditions are met:

The endpoint isdisconnectedfrom the internet or the Cortex XDR management console, and therefore cannot communicate with WildFire.

The verdict from WildFire is of a typeunknown, meaning that WildFire has not yet analyzed the file or has not reached a conclusive verdict.

Local Analysis uses machine learning models to assess the behavior and characteristics of the file and assign it a verdict of either benign, malware, or grayware. If the verdict is malware or grayware, the agent will block the file from running and report it to the Cortex XDR management console. If the verdict is benign, the agent will allow the file to run and report it to the Cortex XDR management console.Reference:

Local Analysis

WildFire File Verdicts

Total 91 questions
Go to page: of 10