New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Paloalto Networks XSIAM-Engineer Palo Alto Networks XSIAM Engineer Exam Practice Test

Demo: 17 questions
Total 59 questions

Palo Alto Networks XSIAM Engineer Questions and Answers

Question 1

An application which ingests custom application logs is hosted in an on-premises virtual environment on an Ubuntu server, and it logs locally to a .csv file.

Which set of actions will allow the ingestion of the .csv logs into Cortex XSIAM directly from the server?

An application which ingests custom application logs is hosted in an on-premises virtual environment on an Ubuntu server, and it logs locally to a .csv file.

Which set of actions will allow the ingestion of the .csv logs into Cortex XSIAM directly from the server?

Options:

A.

Install a Broker VM in the environment, and configure the CSV Collector to collect the files of interest.

B.

Install a Cortex XDR agent on the Ubuntu server, and configure the agent to collect the files of interest.

C.

Install a Broker VM in the environment, and migrate the application to the Broker VM.

D.

Install XDR Collector on the Ubuntu server, and configure the agent to collect the files of interest.

Question 2

A Cortex XDR agent is installed on an endpoint, but the agent is unable to download content updates and has not registered with the Cortex XSIAM server. An engineer troubleshoots the network connection and determines that, by design, this endpoint does not have direct internet access to the required network destinations for the Cortex XDR agent traffic.

A Broker VM that has the local agent settings applet enabled with Agent Proxy configured is reachable by the endpoint. The Broker VM details are as follows:

FQDN: crtxbroker01.company.net

Proxy listening port: 8888

How should the engineer configure the Cortex XDR agent to use the existing Broker VM as a proxy for the agent network traffic?

Options:

A.

cytool proxy set "crtxbroker01. company.net: 8888"

B.

cytool config proxy --host crtxbroker01.company.net --port 8888

C.

cytool set proxy --host crtxbroker01.company.net --port 8888

D.

cytool proxy config "crtxbroker01.company.net:8888"

Question 3

Which types of content may be included in a Marketplace content pack?

Options:

A.

Integrations, playbooks, parsers, and server configuration keys

B.

Predefined dashboards, indicators, and reports

C.

Scripts, playbooks, integrations, and correlation rules

D.

Behavioral indicator of compromise (BIOC) rules, layouts, and custom dashboards

Question 4

How can a Cortex XSIAM engineer resolve the issue when a SOC analyst escalates missing details after merging two similar incidents?

Options:

A.

Check the War Room of the destination incident.

B.

Examine the incident context of the source incident.

C.

Unmerge the incidents and copy the missing details into the incident notes.

D.

Check the child incident of the destination incident.

Question 5

A security engineer notices that in the past week ingestion has spiked significantly. Upon investigating the anomaly, it is determined that a custom application developed in-house caused the spike. The custom application is sending syslog to the Broker VM Syslog Collector applet. The engineer consults with the SOC analyst, who determines that 90% of the logs from the custom application are not used.

What can the engineer configure to reduce the ingestion?

Options:

A.

Parsing rule to drop the unnecessary data at the Broker VM

B.

Data model rule to drop the unnecessary data

C.

Correlation rule on the Cortex XSIAM server to drop the unnecessary data

D.

Data model rule to map the useful data

Question 6

A Cortex XSIAM engineer is developing a playbook that uses reputation commands such as '!ip' to enrich and analyze indicators.

Which statement applies to the use of reputation commands in this scenario?

Options:

A.

If no reputation integration instance is configured, the '!ip' command will execute but will return no results.

B.

Reputation commands such as '!ip' will fail if the required reputation integration instance is not configured and enabled.

C.

The mapping flow for enrichment commands is disabled if extraction is set to "None."

D.

Enrichment data will not be saved to the indicator unless the extraction setting is manually configured in the playbook task.

Question 7

Which installer type should be used when upgrading a non-Linux Kubernetes cluster?

Options:

A.

Standalone

B.

Helm

C.

Upgrade from ESM

D.

Kubernetes

Question 8

What is the reason all Broker VM options are greyed out when a user attempts to select a Broker VM as a download source in the Agent Settings profile?

Options:

A.

The Broker VM is offline.

B.

NTP is not synchronized properly on the Broker VM.

C.

Local Agent Setting applet is currently activated without SSL certificate.

D.

Local Agent Setting applet is currently activated without FQDN.

Question 9

What is the purpose of using rolling tokens to manage Cortex XDR agents?

Options:

A.

To periodically rotate encryption keys used for tenant communication

B.

To perform administration on agents without requiring static credentials

C.

To authorize agents to download and install content updates

D To temporarily disable the agents during maintenance windows

Question 10

In which two locations can correlation rules be monitored for errors? (Choose two.)

Options:

A.

XDR Collector audit logs (type = Rules, subtype = Error)

B.

correlations_auditing dataset through XQL

C.

Management audit logs (type = Rules, subtype = Error)

D.

Alerts table as a health alert

Question 11

A vulnerability analyst asks a Cortex XSIAM engineer to identify assets vulnerable to newly reported zero-day CVE affecting the "ai_app" application and versions 12.1, 12.2, 12.4, and 12.5.

Which XQL query will provide the required result?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 12

Which section of a parsing rule defines the newly created dataset?

Options:

A.

RULE

B.

COLLECT

C.

INGEST

D.

CONST

Question 13

A Cortex XSIAM engineer adds a disable injection and prevention rule for a specific running process. After an hour, the engineer disables the rule to reinstate the security capabilities, but the capabilities are not applied.

What is the explanation for this behavior?

Options:

A.

The engineer needs to restart the process to get back the security capabilities.

B.

The engineer needs a support exception to get back the security capabilities.

C.

The engineer needs to wait for the time period configured in the rule to pass first.

D.

The engineer can disable the rule, but security capabilities are not applied to the process.

Question 14

A systems engineer overseeing the integration of data from various sources through data pipelines into Cortex XSIAM notices modifications occurring during the ingestion process, and these modifications reduce the accuracy of threat detection and response. The engineer needs to assess the risks associated with the pre-ingestion data modifications and develop effective solutions for data integrity and system efficacy.

Which set of steps must be followed to meet these goals?

Options:

A.

Develop an advanced monitoring system to track and log all changes made to data during ingestion, and use analytics to compare pre- and post-ingestion states based on XDM to identify and mitigate discrepancies.

B.

Design a hybrid approach for critical data fields to be safeguarded against modifications during ingestion, while less critical data fields undergo allowable modifications that are rectified post-ingestion by using XDM to balance performance with data integrity.

C.

Implement a pre-ingestion data validation process that aligns with the post-ingestion standards set by XDM, ensuring data consistency and integrity before it enters Cortex XSIAM.

D.

Establish a process to minimize data modifications during ingestion, prioritizing raw data capture and using XDM post-ingestion for necessary transformations and integrity checks.

Question 15

A sub-playbook is configured to loop with a For Each Input. The following inputs are given to the sub-playbook:

Input x: W,X,Y,Z

Input y: a,b,c,d

Input z: 9

Which inputs will be used for the second iteration of the loop?

Options:

A.

a,b,c,d

B.

X,b,9

C.

X,b

D.

X,b,c

Question 16

When activating the Cortex XSIAM tenant, how is the data at rest configured with AES 128 encryption?

Options:

A.

Under Advanced -> Encryption Method, choose the desired encryption method during the initial setup of the tenant.

B.

Under Advanced, choose "BYOK," and adhere to the wizard's instructions as outlined in the encryption method section.

C.

Create encryption keys with AES 128 and upload it securely through Cortex Gateway.

D.

Under Advanced -> Encryption Method, choose the desired encryption method after the initial setup of the tenant.

Question 17

What is the role of "in" in the query line below?

action_local_port in (1122, 2234)

Options:

A.

Operand

B.

Operator

C.

Function

D.

Range

Demo: 17 questions
Total 59 questions