Month End Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

PSE-Cortex Palo Alto Networks System Engineer - Cortex Professional Questions and Answers

Questions 4

A prospect has agreed to do a 30-day POC and asked to integrate with a product that Demisto currently does not have an integration with. How should you respond?

Options:

A.

Extend the POC window to allow the solution architects to build it

B.

Tell them we can build it with Professional Services.

C.

Tell them custom integrations are not created as part of the POC

D.

Agree to build the integration as part of the POC

Buy Now
Questions 5

Which technology allows a customer to integrate Cortex Xpanse with third-party applications or services, assets, and IP ranges while leveraging investigation capabilities?

Options:

A.

POSTMAN

B.

Webhook

C.

REST API

D KPI

Buy Now
Questions 6

When preparing for a Cortex XSOAR proof of value (POV), which task should be performed before the evaluation is requested?

Options:

A.

Ensuring that the customer has single sign-on (SSO) configured in their environment

B.

Building out an executive-IeveI proposal detailing the product capabilities

C.

Planning for every different use case the customer has for the solution

D.

Gathering a list of the different integrations that will need to be configured

Buy Now
Questions 7

How does a clear understanding of a customer’s technical expertise assist in a hand off following the close of an opportunity?

Options:

A.

It enables customers to prepare for audits so they can demonstrate compliance.

B.

It helps in assigning additional technical tasks to the customer

C.

It allows implementation teams to bypass initial scoping exercises

D.

It enables post-sales teams to tailor their support and training appropriately

Buy Now
Questions 8

Which Cortex XDR license is required for a customer that requests endpoint detection and response (EDR) data collection capabilities?

Options:

A.

Cortex XDR Pro per TB

B.

Cortex XDR Endpoint

C.

Cortex XDR Prevent

D.

Cortex XDR Pro Per Endpoint

Buy Now
Questions 9

Which two formats are supported by Whitelist? (Choose two)

Options:

A.

Regex

B.

STIX

C.

CSV

D.

CIDR

Buy Now
Questions 10

Which two actions are required to add indicators to the whitelist? (Choose two.)

Options:

A.

Click "New Whitelisted Indicator" in the Whitelist page.

B.

Upload an external file named "whitelist" to the Whitelist page.

C.

Upload an external file named "whitelist" to the Indicators page.

D.

Select the indicators and click "Delete and Whitelist" in the Indicators page.

Buy Now
Questions 11

Which two Cortex XSOAR incident type features can be customized under Settings > Advanced > Incident Types? (Choose two.)

Options:

A.

adding new fields to an incident type

B.

setting reminders for an incident service level agreement

C.

defining whether a playbook runs automatically when an incident type is encountered

D.

dropping new incidents of the same type that contain similar information

Buy Now
Questions 12

Which source provides data for Cortex XDR?

Options:

A.

VMware NSX

B.

Amazon Alexa rank indicator

C.

Cisco ACI

D.

Linux endpoints

Buy Now
Questions 13

How can you view all the relevant incidents for an indicator?

Options:

A.

Linked Incidents column in Indicator Screen

B.

Linked Indicators column in Incident Screen

C.

Related Indicators column in Incident Screen

D.

Related Incidents column in Indicator Screen

Buy Now
Questions 14

When analyzing logs for indicators, which are used for only BIOC identification'?

Options:

A.

observed activity

B.

artifacts

C.

techniques

D.

error messages

Buy Now
Questions 15

The images show two versions of the same automation script and the results they produce when executed in Demisto. What are two possible causes of the exception thrown in the second Image? (Choose two.)

SUCCESS

PSE-Cortex Question 15

Options:

A.

The modified scnpt was run in the wrong Docker image

B.

The modified script required a different parameter to run successfully.

C.

The dictionary was defined incorrectly in the second script.

D.

The modified script attempted to access a dictionary key that did not exist in the dictionary named "data”

Buy Now
Questions 16

Which feature of Cortex XSIAM helps analyst reduce the noise and false positives that often plague traditional SIEM systems?

Options:

A.

Alert range indicators

B.

Al-generated correlation rules

C.

Automatic incident scoring

D.

Dynamic alarm fields

Buy Now
Questions 17

An adversary is attempting to communicate with malware running on your network for the purpose of controlling malware activities or for ex filtrating data from your network. Which Cortex XDR Analytics alert is this activity most likely to trigger'?

Options:

A.

Uncommon Local Scheduled Task Creation

B.

Malware

C.

New Administrative Behavior

D.

DNS Tunneling

Buy Now
Questions 18

How do sub-playbooks affect the Incident Context Data?

Options:

A.

When set to private, task outputs do not automatically get written to the root context

B.

When set to private, task outputs automatically get written to the root context

C.

When set to global, allows parallel task execution.

D.

When set to global, sub-playbook tasks do not have access to the root context

Buy Now
Questions 19

Which task allows the playbook to follow different paths based on specific conditions?

Options:

A.

Conditional

B.

Automation

C.

Manual

D.

Parallel

Buy Now
Questions 20

Which method is used for third-party network data consumption?

Options:

A.

scripts library from the action center

B.

Open Database Connectivity (ODBC) connection to network device database

C.

Common Event Format (CEF) via broker Syslog module

D.

file reader to the /var/log/messages file on the device

Buy Now
Questions 21

What are two ways a customer can configure user authentication access Cortex Xpanse? (Choose two.)

Options:

A.

Secure Shell (SSH)

B.

SAML

C.

RADIUS

D.

Customer Support Portal

Buy Now
Questions 22

What is a key difference between audit users and full users in Cortex XSOAR?

Options:

A.

Audit users can only view incidents, while full users can edit system components.

B.

Full users can only view dashboards, while audit users can investigate incidents.

C.

Audit users have read-only permission, white full users have read-write permission.

D.

Audit users can run scripts and playbooks, while full users can only view reports.

Buy Now
Questions 23

Which two areas of Cortex XDR are used for threat hunting activities? (Choose two.)

Options:

A.

indicators of compromise (IOC) rules

B.

query builder

C.

live terminal

D.

host insights module

Buy Now
Questions 24

A customer has purchased Cortex Data Lake storage with the following configuration, which requires 2 TB of Cortex Data Lake to order:

support for 300 total Cortex XDR clients all forwarding Cortex XDR data with 30-day retention

storage for higher fidelity logs to support Cortex XDR advanced analytics

The customer now needs 1000 total Cortex XDR clients, but continues with 300 clients forwarding Cortex XDR data with 30-day retention.

What is the new total storage requirement for Cortex Data Lake storage to order?

Options:

A.

16 TB

B.

4 TB

C.

8 TB

D.

2 TB

Buy Now
Questions 25

A customer has 2700 endpoints. There is currently concern about recent attacks in their industry and threat intelligence from a third-party subscription. In an attempt to be proactive, phishing simulations have been prioritized, but the customer wants to gain more visibility and remediation capabilities specific to their network traffic.

Which Cortex product provides these capabilities?

Options:

Buy Now
Questions 26

Which two methods does the Cortex XDR agent use to identify malware during a scheduled scan? (Choose two.)

Options:

A.

WildFire hash comparison

B.

heuristic analysis

C.

signature comparison

D.

dynamic analysis

Buy Now
Questions 27

Which playbook functionality allows grouping of tasks to create functional building blocks?

Options:

A.

playbook features

B.

sub-playbooks

C.

conditional tasks

D.

manual tasks

Buy Now
Questions 28

Cortex XDR external data ingestion processes ingest data from which sources?

Options:

A.

windows event logs only

B.

syslogs only

C.

windows event logs, syslogs, and custom external sources

D.

windows event logs and syslogs only

Buy Now
Questions 29

Which statement applies to the differentiation of Cortex XDR from security information and event management (SIEM)?

Options:

A.

SIEM has access to raw logs from agents, where Cortex XDR traditionally only gets alerts.

B.

Cortex XDR allows just logging into the console and out of the box the events were blocked as a proactive approach.

C.

Cortex XDR requires a large and diverse team of analysts and up to several weeks for simple actions like creating an alert.

D.

SIEM has been entirely designed and built as cloud-native, with the ability to stitch together cloud logs, on-premises logs, third-party logs, and endpoint logs.

Buy Now
Questions 30

Which statement applies to the malware protection flow in Cortex XDR Prevent?

Options:

A.

Local static analysis happens before a WildFire verdict check.

B.

In the final step, the block list is verified.

C.

A trusted signed file is exempt from local static analysis.

D.

Hash comparisons come after local static analysis.

Buy Now
Questions 31

What is the size of the free Cortex Data Lake instance provided to a customer who has activated a TMS tenant, but has not purchased a Cortex Data Lake instance?

Options:

A.

10 GB

B.

1 TB

C.

10 TB

D.

100 GB

Buy Now
Questions 32

Which task setting allows context output to a specific key?

Options:

A.

extend context

B.

stop on errors

C.

task output

D.

lags

Buy Now
Questions 33

Which process in the causality chain does the Cortex XDR agent identify as triggering an event sequence?

Options:

A.

the relevant shell

B.

The causality group owner

C.

the adversary's remote process

D.

the chain's alert initiator

Buy Now
Questions 34

What is a requirement when integrating Cortex XSIAM or Cortex XDR with other Palo Alto Networks products?

Options:

A.

Advanced logging service license

B.

HTTP Collector

C.

Devices in the same region as XDR/XSIAM

D.

XDR/XSIAM Broker VM

Buy Now
Questions 35

Which option is required to prepare the VDI Golden Image?

Options:

A.

Configure the Golden Image as a persistent VDI

B.

Use the Cortex XDR VDI tool to obtain verdicts for all PE files

C.

Install the Cortex XOR Agent on the local machine

D.

Run the Cortex VDI conversion tool

Buy Now
Questions 36

When initiated, which Cortex XDR capability allows immediate termination of the process-or entire process tree-on an anomalous process discovered during investigation of a security event?

Options:

A.

Live sensors

B.

Live terminal

C.

Log forwarding

D.

Log stitching

Buy Now
Questions 37

How does DBot score an indicator that has multiple reputation scores?

Options:

A.

uses the most severe score scores

B.

the reputation as undefined

C.

uses the average score

D.

uses the least severe score

Buy Now
Questions 38

A test for a Microsoft exploit has been planned. After some research Internet Explorer 11 CVE-2016-0189 has been selected and a module in Metasploit has been identified

(exploit/windows/browser/ms16_051_vbscript)

The description and current configuration of the exploit are as follows;

PSE-Cortex Question 38

What is the remaining configuration?

A)

PSE-Cortex Question 38

B)

PSE-Cortex Question 38

C)

PSE-Cortex Question 38

D)

PSE-Cortex Question 38

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 39

Which two entities can be created as a BIOC? (Choose two.)

Options:

A.

file

B.

registry

C.

event log

D.

alert log

Buy Now
Questions 40

If you have a playbook task that errors out. where could you see the output of the task?

Options:

A.

/var/log/messages

B.

War Room of the incident

C.

Demisto Audit log

D.

Playbook Editor

Buy Now
Questions 41

A customer has purchased Cortex XSOAR and has a need to rapidly stand up the product in their environment. The customer has stated that their internal staff are currently occupied with other projects.

Which Palo Alto Networks service offering should be recommended to the customer?

Options:

A.

Deployment

B.

Onboardinq

C.

Fast-Track

D.

QuickStart

Buy Now
Questions 42

What are two capabilities of a War Room? (Choose two.)

Options:

A.

create widgets for an investigation

B.

create playbooks for orchestration

C.

act as an audit trail for an investigation

D.

run ad-hoc automation commands

Buy Now
Questions 43

On a multi-tenanted v6.2 Cortex XSOAR server, which path leads to the server.log for "Tenant1"?

Options:

A.

/var/log/demisto/acc_Tenant1/server.log

B.

/var/log/demisto/Tenant1/server.log

C.

/var/lib/demisto/acc_Tenant1/server.log

D.

/var/lib/demisto/server.log

Buy Now
Questions 44

What is used to display only file entries in a War Room?

Options:

A.

files from War Room CLI WW

B.

incident files section in layout builder

C.

files and attachments filters

D.

/files from War Room CLI

Buy Now
Questions 45

In the DBotScore context field, which context key would differentiate between multiple entries for the same indicator in a multi-TIP environment?

Options:

A.

Vendor

B.

Type

C.

Using

D.

Brand

Buy Now
Questions 46

What is a benefit of user entity behavior analytics (UEBA) over security information and event management (SIEM)?

Options:

A.

SIEMs supports only agentless scanning, not agent-based workload protection across VMs, containers/Kubernetes.

B.

UEBA can add trusted signers of Windows or Mac processes to a whitelist in the Endpoint Security Manager (ESM) Console.

C.

SIEMs have difficulty detecting unknown or advanced security threats that do not involve malware, such as credential theft.

D.

UEBA establishes a secure connection in which endpoints can be routed, and it collects and forwards logs and files for analysis.

Buy Now
Questions 47

Which type of log is ingested natively in Cortex XDR Pro per TB?

Options:

A.

Google Kubernetes Engine

B.

Demisto

C.

Docker

D.

Microsoft Office 365

Buy Now
Questions 48

What is the requirement for enablement of endpoint and network analytics in Cortex XDR?

Options:

A.

Cloud Identity Engine configured and enabled

B.

Network Mapper applet on the Broker VM configured and enabled

C.

Logs from at least 30 endpoints over a minimum of two weeks

D.

Windows DHCP logs ingested via a Cortex XDR collector

Buy Now
Questions 49

Why is Premium Customer Success an important part of any Cortex bill of materials?

Options:

A.

It provides full implementation services.

B.

It provides managed threat hunting

C.

It provides instructor-led training courses.

D.

It provides expert-led configuration guidance.

Buy Now
Questions 50

In addition to incident volume, which four critical factors must be evaluated to determine effectiveness and ROI on cybersecurity planning and technology?

Options:

A.

Analyst, training costs, duplicated, false positives

B.

People, staffing costs, duplicates, false positives

C.

People, security controls, mean time to detect, false positives

D.

Standard operating procedures, staffing costs, duplicates, mean time to respond

Buy Now
Exam Code: PSE-Cortex
Exam Name: Palo Alto Networks System Engineer - Cortex Professional
Last Update: Apr 24, 2025
Questions: 168

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now PSE-Cortex testing engine

PDF (Q&A)

$36.75  $104.99
buy now PSE-Cortex pdf