ExamGecko
Question list
Search
Search

Question 28 - PCDRA discussion

Report
Export

Which statement best describes how Behavioral Threat Protection (BTP) works?

A.
BTP injects into known vulnerable processes to detect malicious activity.
Answers
A.
BTP injects into known vulnerable processes to detect malicious activity.
B.
BTP runs on the Cortex XDR and distributes behavioral signatures to all agents.
Answers
B.
BTP runs on the Cortex XDR and distributes behavioral signatures to all agents.
C.
BTP matches EDR data with rules provided by Cortex XDR.
Answers
C.
BTP matches EDR data with rules provided by Cortex XDR.
D.
BTP uses machine Learning to recognize malicious activity even if it is not known.
Answers
D.
BTP uses machine Learning to recognize malicious activity even if it is not known.
Suggested answer: D

Explanation:

The statement that best describes how Behavioral Threat Protection (BTP) works is D, BTP uses machine learning to recognize malicious activity even if it is not known. BTP is a feature of Cortex XDR that allows you to define custom rules to detect and block malicious behaviors on endpoints. BTP uses machine learning to profile behavior and detect anomalies indicative of attack. BTP can recognize malicious activity based on file attributes, registry keys, processes, network connections, and other criteria, even if the activity is not associated with any known malware or threat. BTP rules are updated through content updates and can be managed from the Cortex XDR console.

The other statements are incorrect for the following reasons:

A is incorrect because BTP does not inject into known vulnerable processes to detect malicious activity. BTP does not rely on process injection, which is a technique used by some malware to hide or execute code within another process. BTP monitors the behavior of all processes on the endpoint, regardless of their vulnerability status, and compares them with the BTP rules.

B is incorrect because BTP does not run on the Cortex XDR and distribute behavioral signatures to all agents. BTP runs on the Cortex XDR agent, which is installed on the endpoint, and analyzes the endpoint data locally. BTP does not use behavioral signatures, which are predefined patterns of malicious behavior, but rather uses machine learning to identify anomalies and deviations from normal behavior.

C is incorrect because BTP does not match EDR data with rules provided by Cortex XDR. BTP is part of the EDR (Endpoint Detection and Response) capabilities of Cortex XDR, and uses the EDR data collected by the Cortex XDR agent to perform behavioral analysis. BTP does not match the EDR data with rules provided by Cortex XDR, but rather applies the BTP rules defined by the Cortex XDR administrator or the Palo Alto Networks threat research team.

Cortex XDR Agent Administrator Guide: Behavioral Threat Protection

Cortex XDR: Stop Breaches with AI-Powered Cybersecurity

asked 23/09/2024
Matthew Farrington
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first