Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

PSE-Cortex-Pro-24 Palo Alto Networks Systems Engineer Professional - Cortex Questions and Answers

Questions 4

When analyzing logs for indicators, which are used for only BIOC identification ' ?

Options:

A.

observed activity

B.

artifacts

C.

techniques

D.

error messages

Buy Now
Questions 5

What should be configured for a Cortex XSIAM customer who wants to automate the response to certain alerts?

Options:

A.

Playbook triggers

B.

Correlation rules

C.

Incident scoring

D.

Data model rules

Buy Now
Questions 6

The images show two versions of the same automation script and the results they produce when executed in Demisto. What are two possible causes of the exception thrown in the second Image? (Choose two.)

SUCCESS

PSE-Cortex-Pro-24 Question 6

Options:

A.

The modified scnpt was run in the wrong Docker image

B.

The modified script required a different parameter to run successfully.

C.

The dictionary was defined incorrectly in the second script.

D.

The modified script attempted to access a dictionary key that did not exist in the dictionary named " data”

Buy Now
Questions 7

Which description applies to the features of the Cortex platform as a holistic ecosystem?

Options:

A.

It is solely focused on reactive security measures, neglecting proactive approaches.

B.

It offers an end-to-end security solution, covering every step of security processes.

C.

It primarily focuses on endpoint prevention without addressing other security aspects

D.

It provides a partial security solution, leaving some steps of the security process uncovered.

Buy Now
Questions 8

What is a benefit of user entity behavior analytics (UEBA) over security information and event management (SIEM)?

Options:

A.

SIEMs supports only agentless scanning, not agent-based workload protection across VMs, containers/Kubernetes.

B.

UEBA can add trusted signers of Windows or Mac processes to a whitelist in the Endpoint Security Manager (ESM) Console.

C.

SIEMs have difficulty detecting unknown or advanced security threats that do not involve malware, such as credential theft.

D.

UEBA establishes a secure connection in which endpoints can be routed, and it collects and forwards logs and files for analysis.

Buy Now
Questions 9

What method does the Traps agent use to identify malware during a scheduled scan?

Options:

A.

Heuristic analysis

B.

Local analysis

C.

Signature comparison

D.

WildFire hash comparison and dynamic analysis

Buy Now
Questions 10

Which action should be performed by every Cortex Xpanse proof of value (POV)?

Options:

A.

Grant the customer access to the management console immediately following activation.

B.

Provide the customer with an export of all findings at the conclusion of the POV.

C.

Enable all of the attach surface rules to show the highest number of alerts.

D.

Review the mapping in advance to identity a few interesting findings to share with the customer.

Buy Now
Questions 11

During the TMS instance activation, a tenant (Customer) provides the following information for the fields in the Activation - Step 2 of 2 window.

PSE-Cortex-Pro-24 Question 11

During the service instance provisioning which three DNS host names are created? (Choose three.)

Options:

A.

cc-xnet50.traps.paloaltonetworks.com

B.

hc-xnet50.traps.paloaltonetworks.com

C.

cc-xnet.traps.paloaltonetworks.com

D.

cc.xnet50traps.paloaltonetworks.com

E.

xnettraps.paloaltonetworks.com

F.

ch-xnet.traps.paloaltonetworks.com

Buy Now
Questions 12

Which aspect of Cortex Xpanse allows for visibility over remote workforce risks?

Options:

A.

The ability to identify customer assets on residential networks

B.

The use of a VPN connection to scan remote devices

C.

The deployment of a Cortex Xpanse aqent on the remote endpoint

D.

The presence of a portal for remote workers to use for posture checking

Buy Now
Questions 13

Where is the best place to find official resource material?

Options:

A.

Online forums

B.

Video series

C.

Administrator ' s guide

D.

Technical blogs

Buy Now
Questions 14

Where is the output of the task visible when a playbook task errors out?

Options:

A.

playbook editor

B.

XSOAR audit log

C.

/var/log/messages

D.

War Room of the incident

Buy Now
Questions 15

How can you view all the relevant incidents for an indicator?

Options:

A.

Linked Incidents column in Indicator Screen

B.

Linked Indicators column in Incident Screen

C.

Related Indicators column in Incident Screen

D.

Related Incidents column in Indicator Screen

Buy Now
Questions 16

How many use cases should a POC success criteria document include?

Options:

A.

only 1

B.

3 or more

C.

no more than 5

D.

no more than 2

Buy Now
Questions 17

The certificate used for decryption was installed as a trusted toot CA certificate to ensure communication between the Cortex XDR Agent and Cortex XDR Management Console. What action needs to be taken if the administrator determines the Cortex XDR Agents are not communicating with the Cortex XDR Management Console?

Options:

A.

add paloaltonetworks.com to the SSL Decryption Exclusion list

B.

enable SSL decryption

C.

disable SSL decryption

D.

reinsta ll the root CA certificate

Buy Now
Questions 18

Which option describes a Load-Balancing Engine Group?

Options:

A.

A group of engines that use an algorithm to efficiently share the workload for integrations

B.

A group of engines that ensure High Availability of Demisto backend databases.

C.

A group of engines that use an algorithm to efficiently share the workload for automation scripts

D.

A group of D2 agents that share processing power across multiple endpoints

Buy Now
Questions 19

The Cortex XDR management service requires which other Palo Alto Networks product?

Options:

A.

Directory Sync

B.

Cortex Data Lake

C.

Panorama

D.

Cortex XSOAR

Buy Now
Questions 20

Which process in the causality chain does the Cortex XDR agent identify as triggering an event sequence?

Options:

A.

the relevant shell

B.

The causality group owner

C.

the adversary ' s remote process

D.

the chain ' s alert initiator

Buy Now
Questions 21

What does the Cortex XSOAR " Saved by Dbot " widget calculate?

Options:

A.

amount saved in Dollars according to actions carried out by all users in Cortex XSOAR across all incidents

B.

amount saved in Dollars by using Cortex XSOAR instead of other products

C.

amount of time saved by each playbook task within an incident

D.

amount of time saved by Dbot ' s machine learning (ML) capabilities

Buy Now
Questions 22

Which element displays an entire picture of an attack, including the root cause or delivery point?

Options:

A.

Cortex XSOAR Work Plan

B.

Cortex SOC Orchestrator

C.

Cortex Data Lake

D.

Cortex XDR Causality View

Buy Now
Questions 23

Which CLI query would bring back Notable Events from Splunk?

A)

PSE-Cortex-Pro-24 Question 23

B)

PSE-Cortex-Pro-24 Question 23

C)

PSE-Cortex-Pro-24 Question 23

D)

PSE-Cortex-Pro-24 Question 23

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 24

Which command is used to add Cortex XSOAR " User1 " to an investigation from the War Room command-line interface (CLI)?

Options:

A.

/invite User1

B.

#User1

C.

@User1

D.

!invite User1

Buy Now
Questions 25

What allows the use of predetermined Palo Alto Networks roles to assign access rights to Cortex XDR users?

Options:

A.

role-based access control

B.

cloud identity engine

C.

endpoint groups

D.

restrictions security profile

Buy Now
Questions 26

How does Cortex XSOAR automation save time when a phishing incident occurs?

Options:

A.

By developing an integration.

B.

By responding to management with risk scores

C.

By purging unopened phishing email from user mailboxes

D.

By emailing staff to inform them of phishing attack in advance

Buy Now
Questions 27

Within Cortex XSIAM, how does the integration of Attack Surface Management (ASM) provide a unified approach to security event management that traditional SIEMs typically lack?

Options:

A.

By providing a queryable dataset of ASM data for threat hunting

B.

By offering dashboards on ASM data within the management console

C.

By manually correlating of ASM data with security events

D.

By enriching incidents with ASM data for all internet-facing assets

Buy Now
Questions 28

What is the result of creating an exception from an exploit security event?

Options:

A.

White lists the process from Wild Fire analysis

B.

exempts the user from generating events for 24 hours

C.

exempts administrators from generating alerts for 24 hours

D.

disables the triggered EPM for the host and process involve

Buy Now
Questions 29

What is the primary mechanism for the attribution of attack surface data in Cortex Xpanse?

Options:

A.

Active scanning with network-installed agents

B.

Dark web monitoring

C.

Customer-provided asset inventory lists

D.

Scanning from public internet data sources

Buy Now
Questions 30

Which two items are stitched to the Cortex XDR causality chain ' ' (Choose two)

Options:

A.

firewall alert

B.

SIEM alert

C.

full URL

D.

registry set value

Buy Now
Questions 31

When preparing the golden image in a Cortex XDR Virtual Desktop Infrastructure (VDI) deployment, which step is required?

Options:

A.

Disable automatic memory dumps.

B.

Scan the image using the imagepreptool.

C.

Launch the VDI conversion tool.

D.

Enable the VDI license timeout.

Buy Now
Questions 32

Given the exception thrown in the accompanying image by the Demisto REST API integration, which action would most likely solve the problem?

PSE-Cortex-Pro-24 Question 32

Which two playbook functionalities allow looping through a group of tasks during playbook execution? (Choose two.)

Options:

A.

Generic Polling Automation Playbook

B.

Playbook Tasks

C.

Sub-Play books

D.

Playbook Functions

Buy Now
Questions 33

A customer wants to modify the retention periods of their Threat logs in Cortex Data Lake.

Where would the user configure the ratio of storage for each log type?

Options:

A.

Within the TMS, create an agent settings profile and modify the Disk Quota value

B.

It is not possible to configure Cortex Data Lake quota for specific log types.

C.

Go to the Cortex Data Lake App in Cloud Services, then choose Configuration and modify the Threat Quota

D.

Write a GPO for each endpoint agent to check in less often

Buy Now
Questions 34

A customer wants the main Cortex XSOAR server installed in one site and wants to integrate with three other technologies in a second site.

What communications are required between the two sites if the customer wants to install a Cortex XSOAR engine in the second site?

Options:

A.

The Cortex XSOAR server at the first site must be able to initiate a connection to the Cortex XSOAR engine at the second site.

B.

All connectivity is initiated from the Cortex XSOAR server on the first site via a managed cloud proxy.

C.

Dedicated site-to-site virtual private network (VPN) is required for the Cortex XSOAR server at the first site to initiate a connection to the Cortex XSOAR engine at the second site.

D.

The Cortex XSOAR engine at the first site must be able to initiate a connection to the Cortex XSOAR server at the second site.

Buy Now
Questions 35

For which two purposes can Cortex XSOAR engines be deployed? (Choose two.)

Options:

A.

To execute recurring daybooks based on specific time schedules or changed to a feed

B.

To add processing resources for a heavily-used integration via load-balancing groups.

C.

To integrate with tools in a network location that the Cortex XSOAR server cannot reach directly

D.

To connect Cortex XSOAR to all required Palo Alto Networks resources such as the Cortex Gateway

Buy Now
Questions 36

If a customer activates a TMS tenant and has not purchased a Cortex Data Lake instance.

Palo Alto Networks will provide the customer with a free instance

What size is this free Cortex Data Lake instance?

Options:

A.

1 TB

B.

10 GB

C.

100 GB

D.

10 TB

Buy Now
Questions 37

An Administrator is alerted to a Suspicious Process Creation security event from multiple users.

The users believe that these events are false positives Which two steps should the administrator take to confirm the false positives and create an exception? (Choose two )

Options:

A.

With the Malware Security profile, disable the " Prevent Malicious Child Process Execution " module

B.

Within the Malware Security profile add the specific parent process, child process, and command line argument to the child process whitelist

C.

In the Cortex XDR security event, review the specific parent process, child process, and command line arguments

D.

Contact support and ask for a security exception.

Buy Now
Questions 38

Which two entities can be created as a behavioral indicator of compromise (BIOC)? (Choose two.)

Options:

A.

process

B.

data

C.

event alert

D.

network

Buy Now
Questions 39

A prospect has agreed to do a 30-day POC and asked to integrate with a product that Demisto currently does not have an integration with. How should you respond?

Options:

A.

Extend the POC window to allow the solution architects to build it

B.

Tell them we can build it with Professional Services.

C.

Tell them custom integrations are not created as part of the POC

D.

Agree to build the integration as part of the POC

Buy Now
Questions 40

Which two log types should be configured for firewall forwarding to the Cortex Data Lake for use by Cortex XDR? (Choose two)

Options:

A.

Security Event

B.

HIP

C.

Correlation

D.

Analytics

Buy Now
Questions 41

What is a key difference between audit users and full users in Cortex XSOAR?

Options:

A.

Audit users can only view incidents, while full users can edit system components.

B.

Full users can only view dashboards, while audit users can investigate incidents.

C.

Audit users have read-only permission, white full users have read-write permission.

D.

Audit users can run scripts and playbooks, while full users can only view reports.

Buy Now
Questions 42

What does Cortex Xpanse ingest from XDR endpoints?

Options:

A.

MAC addresses

B.

User-agent data

C.

Public IP addresses

D.

Hostnames

Buy Now
Questions 43

Which playbook feature allows concurrent execution of tasks?

Options:

A.

parallel tasks

B.

automation tasks

C.

manual tasks

D.

conditional tasks

Buy Now
Questions 44

Which service helps identify attackers by combining world-class threat intelligence with Cortex XSIAM technology?

Options:

A.

Virtual Desktop Infrastructure

B.

Managed Threat Hunting

C.

Threat Intelligence Platform

D.

Cloud Identity Engine

Buy Now
Questions 45

Which Cortex XDR capability prevents running malicious files from USB-connected removable equipment?

Options:

A.

Device customization

B.

Agent configuration

C.

Agent management

D.

Restrictions profile

Buy Now
Questions 46

Which Cortex XDR capability extends investigations to an endpoint?

Options:

A.

Log Stitching

B.

Causality Chain

C.

Sensors

D.

Live Terminal

Buy Now
Questions 47

Which three Demisto incident type features can be customized under Settings > Advanced > Incident Types? (Choose three.)

Options:

A.

Define whether a playbook runs automatically when an incident type is encountered

B.

Set reminders for an incident SLA

C.

Add new fields to an incident type

D.

Define the way that incidents of a specific type are displayed in the system

E.

Drop new incidents of the same type that contain similar information

Buy Now
Questions 48

What are the key capabilities of the ASM for Remote Workers module?

Options:

A.

Monitoring endpoint activity, managing firewall rules, and mitigating cybersecurity threats

B.

Gathering endpoint data, conducting internal scans, and automating network configurations

C.

Identifying office network vulnerabilities, monitoring remote workforce, and encrypting data

D.

Analyzing global scan data, identifying risky issues on remote networks, and providing internal insights

Buy Now
Questions 49

Which two entities can be created as a BIOC? (Choose two.)

Options:

A.

file

B.

registry

C.

event log

D.

alert log

Buy Now
Questions 50

Which Cortex XSIAM license is required if an organization needs to protect a cloud Kubernetes host?

Options:

A.

Attack Surface Management

B.

Cortex XSIAM Enterprise

C.

Identity Threat Detection and Response

D.

Cortex XSIAM Enterprise Plus

Buy Now
Exam Code: PSE-Cortex-Pro-24
Exam Name: Palo Alto Networks Systems Engineer Professional - Cortex
Last Update: May 11, 2026
Questions: 168

PDF + Testing Engine

$64.99  $185.69

Testing Engine

$49.99  $142.83
buy now PSE-Cortex-Pro-24 testing engine

PDF (Q&A)

$54.99  $157.11
buy now PSE-Cortex-Pro-24 pdf