What is by far the most common tactic used by ransomware to shut down a victim’s operation?
When investigating security events, which feature in Cortex XDR is useful for reverting the changes on the endpoint?
What is the action taken out by Managed Threat Hunting team for Zero Day Exploits?
When selecting multiple Incidents at a time, what options are available from the menu when a user right-clicks the incidents? (Choose two.)
Which of the following protection modules is checked first in the Cortex XDR Windows agent malware protection flow?
Where would you go to add an exception to exclude a specific file hash from examination by the Malware profile for a Windows endpoint?
Which Exploit Prevention Module (EPM) provides better entropy for randomization of memory locations?
While working the alerts involved in a Cortex XDR incident, an analyst has found that every alert in this incident requires an exclusion. What will the Cortex XDR console automatically do to this incident if all alerts contained have exclusions?
What is the standard installation disk space recommended to install a Broker VM?
If you have an isolated network that is prevented from connecting to the Cortex Data Lake, which type of Broker VM setup can you use to facilitate the communication?
Which built-in dashboard would be the best option for an executive, if they were looking for the Mean Time to Resolution (MTTR) metric?
The Cortex XDR console has triggered an incident, blocking a vitally important piece of software in your organization that is known to be benign. Which of the following options would prevent Cortex XDR from blocking this software in the future, for all endpoints in your organization?
As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to download Cobalt Strike on one of your servers. Days later, you learn about a massive ongoing supply chain attack. Using Cortex XDR you recognize that your server was compromised by the attack and that Cortex XDR prevented it. What steps can you take to ensure that the same protection is extended to all your servers?
Which of the following best defines the Windows Registry as used by the Cortex XDR agent?