Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Paloalto Networks XSIAM-Analyst Palo Alto Networks XSIAM Analyst Exam Practice Test

Demo: 15 questions
Total 50 questions

Palo Alto Networks XSIAM Analyst Questions and Answers

Question 1

How would Incident Context be referenced in an alert War Room task or alert playbook task?

Options:

A.

${parentIncidentContext}

B.

${getparentIncidentFields}

C.

${parentIncidentFields}

D.

${getParentIncidentContext}

Question 2

Which configuration will ensure any alert involving a specific critical asset will always receive a score of 100?

Options:

A.

An asset as critical in Asset Inventory

B.

SmartScore to apply the specific score to the critical asset

C.

A user scoring rule for the critical asset

D.

A risk scoring policy for the critical asset

Question 3

An on-demand malware scan of a Windows workstation using the Cortex XDR agent is successful and detects three malicious files. An analyst attempts further investigation of the files by right-clicking on the scan result, selecting "Additional data," then "View related alerts," but no alerts are reported.

What is the reason for this outcome?

Options:

A.

The malicious files were true positives and were automatically quarantined from the scan results

B.

The malware scan action detects malicious files but does not generate alerts for them

C.

The malicious files are currently in an excluded directory in the Malware Profile

D.

The malicious files were false positives and were automatically removed from the scan results

Question 4

An incident in Cortex XSIAM contains the following series of alerts:

    10:24:17 AM - Informational Severity - XDR Analytics BIOC - Rare process execution in organization

    10:24:18 AM - Low Severity - XDR BIOC - Suspicious AMSI DLL load location

    10:24:20 AM - Medium Severity - XDR Agent - WildFire Malware

    11:57:04 AM - High Severity - Correlation - Suspicious admin account creation

Which alert was responsible for the creation of the incident?

Options:

A.

Suspicious AMSI DLL load location

B.

Rare process execution in organization

C.

Suspicious admin account creation

D.

WildFire Malware

Question 5

Based on the artifact details in the image below, what can an analyst infer from the hexagon-shaped object with the exclamation mark (!) at the center?

Options:

A.

The WildFire verdict returned is "Low Confidence."

B.

The artifact verdict has changed from a previous state to "Malware."

C.

The malicious artifact was injected.

D.

The malware requires further analysis.

Question 6

What can be used to filter out empty values in the query results table?

Options:

A.

!= null or != ®

B.

!= empty or != "NA"

C.

!= null or != "NA"

D.

!= empty or != ""

Question 7

Based on the image below, which two determinations can be made from the causality chain? (Choose two.)

Options:

A.

Malware.pdf.exe is responsible for the entire chain of execution resulting in the alerts.

B.

Cortex XDR agent malware profile module applied is set to "Report" mode.

C.

Three alerts in total were generated by the agent on the endpoint.

D.

The process cmd.exe is responsible for the entire chain of execution resulting in the alerts.

Question 8

Which feature terminates a process during an investigation?

Options:

A.

Response Center

B.

Live Terminal

C.

Exclusion

D.

Restriction

Question 9

Which Cytool command will re-enable protection on an endpoint that has Cortex XDR agent protection paused?

Options:

A.

cytool security enable

B.

cytool runtime start

C.

cytool service start

D.

cytool protect enable

Question 10

SCENARIO:

A security analyst has been assigned a ticket from the help desk stating that users are experiencing errors when attempting to open files on a specific network share. These errors state that the file format cannot be opened. IT has verified that the file server is online and functioning, but that all files have unusual extensions attached to them.

The security analyst reviews alerts within Cortex XSIAM and identifies malicious activity related to a possible ransomware attack on the file server. This incident is then escalated to the incident response team for further investigation.

Upon reviewing the incident, the responders confirm that ransomware was successfully executed on the file server. Other details of the attack are noted below:

• An unpatched vulnerability on an externally facing web server was exploited for initial access

• The attackers successfully used Mimikatz to dump sensitive credentials that were used for privilege escalation

• PowerShell was used on a Windows server for additional discovery, as well as lateral movement to other systems

• The attackers executed SystemBC RAT on multiple systems to maintain remote access

• Ransomware payload was downloaded on the file server via an external site "file io"

QUESTION STATEMENT:

Which hunt collection category in Cortex XSIAM should the incident responders use to identify all systems where the attackers established persistence during the attack?

Options:

A.

Remote Access

B.

Network Data

C.

Process Execution

D.

Command History

Question 11

For a critical incident, Cortex XSIAM suggests several playbooks which should have been executed automatically.

Why were the playbooks not executed?

Options:

A.

Misconfiguration of the connector instance has occurred.

B.

Playbook classifier was not configured for the alert type.

C.

Installation of the appropriate content pack was not completed.

D.

Playbook loggers were not configured for those alerts.

Question 12

Which two actions will allow a security analyst to review updated commands from the core pack and interpret the results without altering the incident audit? (Choose two)

Options:

A.

Run the core commands directly from the playground and invite other collaborators.

B.

Run the core commands directly from the Command and Scripts menu inside playground

C.

Create a playbook with the commands and run it from within the War Room

D.

Run the core commands directly by typing them into the playground CLI.

Question 13

Which query will hunt for only incoming traffic from 99.99.99.99 when all log sources have been mapped to XDM?

Options:

A.

datamodel preset = * | filter XDM.ALIAS.ip = "99.99.99.99"

B.

datamodel dataset = * filter XDM.ALIAS.ipv4 = "99.99.99.99"

C.

datamodel dataset = * | fields fieldset.xdm_network | filter xdm.source.ipv4 = "99.99.99.99"

D.

preset = network_story | filter agent_ip_addresses = "99.99.99.99"

Question 14

What is the cause when alerts generated by a correlation rule are not creating an incident?

Options:

A.

The rule is configured with alert severity below Medium.

B.

The rule does not have a drill-down query configured

C.

The rule has alert suppression enabled

D.

The rule is using the preconfigured Cortex XSIAM alert field mapping.

Question 15

Which attribution evidence will have the lowest confidence level when evaluating assets to determine if they belong to an organization’s attack surface?

Options:

A.

An asset discovered through registration information attributed to the organization

B.

An asset attributed to the organization because the name server domain contains the company domain

C.

An asset attributed to the organization because the Subject Organization field contains the company name

D.

An asset manually approved by a Cortex Xpanse analyst

Demo: 15 questions
Total 50 questions