PSE-Cortex-Pro-24 Palo Alto Networks Systems Engineer Professional - Cortex Questions and Answers
When analyzing logs for indicators, which are used for only BIOC identification ' ?
What should be configured for a Cortex XSIAM customer who wants to automate the response to certain alerts?
The images show two versions of the same automation script and the results they produce when executed in Demisto. What are two possible causes of the exception thrown in the second Image? (Choose two.)
SUCCESS

Which description applies to the features of the Cortex platform as a holistic ecosystem?
What is a benefit of user entity behavior analytics (UEBA) over security information and event management (SIEM)?
What method does the Traps agent use to identify malware during a scheduled scan?
During the TMS instance activation, a tenant (Customer) provides the following information for the fields in the Activation - Step 2 of 2 window.

During the service instance provisioning which three DNS host names are created? (Choose three.)
Which aspect of Cortex Xpanse allows for visibility over remote workforce risks?
The certificate used for decryption was installed as a trusted toot CA certificate to ensure communication between the Cortex XDR Agent and Cortex XDR Management Console. What action needs to be taken if the administrator determines the Cortex XDR Agents are not communicating with the Cortex XDR Management Console?
The Cortex XDR management service requires which other Palo Alto Networks product?
Which process in the causality chain does the Cortex XDR agent identify as triggering an event sequence?
Which element displays an entire picture of an attack, including the root cause or delivery point?
Which command is used to add Cortex XSOAR " User1 " to an investigation from the War Room command-line interface (CLI)?
What allows the use of predetermined Palo Alto Networks roles to assign access rights to Cortex XDR users?
Within Cortex XSIAM, how does the integration of Attack Surface Management (ASM) provide a unified approach to security event management that traditional SIEMs typically lack?
What is the primary mechanism for the attribution of attack surface data in Cortex Xpanse?
Which two items are stitched to the Cortex XDR causality chain ' ' (Choose two)
When preparing the golden image in a Cortex XDR Virtual Desktop Infrastructure (VDI) deployment, which step is required?
Given the exception thrown in the accompanying image by the Demisto REST API integration, which action would most likely solve the problem?

Which two playbook functionalities allow looping through a group of tasks during playbook execution? (Choose two.)
A customer wants to modify the retention periods of their Threat logs in Cortex Data Lake.
Where would the user configure the ratio of storage for each log type?
A customer wants the main Cortex XSOAR server installed in one site and wants to integrate with three other technologies in a second site.
What communications are required between the two sites if the customer wants to install a Cortex XSOAR engine in the second site?
If a customer activates a TMS tenant and has not purchased a Cortex Data Lake instance.
Palo Alto Networks will provide the customer with a free instance
What size is this free Cortex Data Lake instance?
An Administrator is alerted to a Suspicious Process Creation security event from multiple users.
The users believe that these events are false positives Which two steps should the administrator take to confirm the false positives and create an exception? (Choose two )
Which two entities can be created as a behavioral indicator of compromise (BIOC)? (Choose two.)
A prospect has agreed to do a 30-day POC and asked to integrate with a product that Demisto currently does not have an integration with. How should you respond?
Which two log types should be configured for firewall forwarding to the Cortex Data Lake for use by Cortex XDR? (Choose two)
Which service helps identify attackers by combining world-class threat intelligence with Cortex XSIAM technology?
Which Cortex XDR capability prevents running malicious files from USB-connected removable equipment?
Which three Demisto incident type features can be customized under Settings > Advanced > Incident Types? (Choose three.)
Which Cortex XSIAM license is required if an organization needs to protect a cloud Kubernetes host?




