New Year Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

XDR-Analyst Palo Alto Networks XDR Analyst Questions and Answers

Questions 4

When creating a BIOC rule, which XQL query can be used?

Options:

A.

dataset = xdr_data

| filter event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

B.

dataset = xdr_data

| filter event_type = PROCESS and

event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

C.

dataset = xdr_data

| filter action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

| fields action_process_image

D.

dataset = xdr_data

| filter event_behavior = true

event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

Buy Now
Questions 5

Which type of BIOC rule is currently available in Cortex XDR?

Options:

A.

Threat Actor

B.

Discovery

C.

Network

D.

Dropper

Buy Now
Questions 6

What kind of the threat typically encrypts user files?

Options:

A.

ransomware

B.

SQL injection attacks

C.

Zero-day exploits

D.

supply-chain attacks

Buy Now
Questions 7

What is by far the most common tactic used by ransomware to shut down a victim’s operation?

Options:

A.

preventing the victim from being able to access APIs to cripple infrastructure

B.

denying traffic out of the victims network until payment is received

C.

restricting access to administrative accounts to the victim

D.

encrypting certain files to prevent access by the victim

Buy Now
Questions 8

Phishing belongs to which of the following MITRE ATT&CK tactics?

Options:

A.

Initial Access, Persistence

B.

Persistence, Command and Control

C.

Reconnaissance, Persistence

D.

Reconnaissance, Initial Access

Buy Now
Questions 9

Can you disable the ability to use the Live Terminal feature in Cortex XDR?

Options:

A.

Yes, via the Cortex XDR console or with an installation switch.

B.

No, a separate installer package without Live Terminal is required.

C.

No, it is a required feature of the agent.

D.

Yes, via Agent Settings Profile.

Buy Now
Questions 10

Which of the following is an example of a successful exploit?

Options:

A.

connecting unknown media to an endpoint that copied malware due to Autorun.

B.

a user executing code which takes advantage of a vulnerability on a local service.

C.

identifying vulnerable services on a server.

D.

executing a process executable for well-known and signed software.

Buy Now
Questions 11

When investigating security events, which feature in Cortex XDR is useful for reverting the changes on the endpoint?

Options:

A.

Remediation Automation

B.

Machine Remediation

C.

Automatic Remediation

D.

Remediation Suggestions

Buy Now
Questions 12

What is the action taken out by Managed Threat Hunting team for Zero Day Exploits?

Options:

A.

MTH researches for threats in the tenant and generates a report with the findings.

B.

MTH researches for threats in the logs and reports to engineering.

C.

MTH runs queries and investigative actions and no further action is taken.

D.

MTH pushes content updates to prevent against the zero-day exploits.

Buy Now
Questions 13

When selecting multiple Incidents at a time, what options are available from the menu when a user right-clicks the incidents? (Choose two.)

Options:

A.

Assign incidents to an analyst in bulk.

B.

Change the status of multiple incidents.

C.

Investigate several Incidents at once.

D.

Delete the selected Incidents.

Buy Now
Questions 14

Which of the following protection modules is checked first in the Cortex XDR Windows agent malware protection flow?

Options:

A.

Hash Verdict Determination

B.

Behavioral Threat Protection

C.

Restriction Policy

D.

Child Process Protection

Buy Now
Questions 15

Where would you go to add an exception to exclude a specific file hash from examination by the Malware profile for a Windows endpoint?

Options:

A.

Find the Malware profile attached to the endpoint, Under Portable Executable and DLL Examination add the hash to the allow list.

B.

From the rules menu select new exception, fill out the criteria, choose the scope to apply it to, hit save.

C.

Find the exceptions profile attached to the endpoint, under process exceptions select local analysis, paste the hash and save.

D.

In the Action Center, choose Allow list, select new action, select add to allow list, add your hash to the list, and apply it.

Buy Now
Questions 16

Which Exploit Prevention Module (EPM) provides better entropy for randomization of memory locations?

Options:

A.

Memory Limit Heap spray check

B.

UASLR

C.

JIT Mitigation

D.

DLL Security

Buy Now
Questions 17

While working the alerts involved in a Cortex XDR incident, an analyst has found that every alert in this incident requires an exclusion. What will the Cortex XDR console automatically do to this incident if all alerts contained have exclusions?

Options:

A.

mark the incident as Unresolved

B.

create a BIOC rule excluding this behavior

C.

create an exception to prevent future false positives

D.

mark the incident as Resolved – False Positive

Buy Now
Questions 18

What is the standard installation disk space recommended to install a Broker VM?

Options:

A.

1GB disk space

B.

2GB disk space

C.

512GB disk space

D.

256GB disk space

Buy Now
Questions 19

If you have an isolated network that is prevented from connecting to the Cortex Data Lake, which type of Broker VM setup can you use to facilitate the communication?

Options:

A.

Broker VM Pathfinder

B.

Local Agent Proxy

C.

Local Agent Installer and Content Caching

D.

Broker VM Syslog Collector

Buy Now
Questions 20

Which built-in dashboard would be the best option for an executive, if they were looking for the Mean Time to Resolution (MTTR) metric?

Options:

A.

Security Manager Dashboard

B.

Data Ingestion Dashboard

C.

Security Admin Dashboard

D.

Incident Management Dashboard

Buy Now
Questions 21

The Cortex XDR console has triggered an incident, blocking a vitally important piece of software in your organization that is known to be benign. Which of the following options would prevent Cortex XDR from blocking this software in the future, for all endpoints in your organization?

Options:

A.

Create an individual alert exclusion.

B.

Create a global inclusion.

C.

Create an endpoint-specific exception.

D.

Create a global exception.

Buy Now
Questions 22

Which version of python is used in live terminal?

Options:

A.

Python 2 and 3 with standard Python libraries

B.

Python 2 and 3 with specific XDR Python libraries developed by Palo Alto Networks

C.

Python 3 with specific XDR Python libraries developed by Palo Alto Networks

D.

Python 3 with standard Python libraries

Buy Now
Questions 23

As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to download Cobalt Strike on one of your servers. Days later, you learn about a massive ongoing supply chain attack. Using Cortex XDR you recognize that your server was compromised by the attack and that Cortex XDR prevented it. What steps can you take to ensure that the same protection is extended to all your servers?

Options:

A.

Create Behavioral Threat Protection (BTP) rules to recognize and prevent the activity.

B.

Enable DLL Protection on all servers but there might be some false positives.

C.

Create IOCs of the malicious files you have found to prevent their execution.

D.

Enable Behavioral Threat Protection (BTP) with cytool to prevent the attack from spreading.

Buy Now
Questions 24

Which of the following represents a common sequence of cyber-attack tactics?

Options:

A.

Actions on the objective » Reconnaissance » Weaponization & Delivery » Exploitation » Installation » Command & Control

B.

Installation >> Reconnaissance » Weaponization & Delivery » Exploitation » Command & Control » Actions on the objective

C.

Reconnaissance » Weaponization & Delivery » Exploitation » Installation » Command & Control » Actions on the objective

D.

Reconnaissance >> Installation » Weaponization & Delivery » Exploitation » Command & Control » Actions on the objective

Buy Now
Questions 25

Which module provides the best visibility to view vulnerabilities?

Options:

A.

Live Terminal module

B.

Device Control Violations module

C.

Host Insights module

D.

Forensics module

Buy Now
Questions 26

Which of the following best defines the Windows Registry as used by the Cortex XDR agent?

Options:

A.

a hierarchical database that stores settings for the operating system and for applications

B.

a system of files used by the operating system to commit memory that exceeds the available hardware resources. Also known as the “swap”

C.

a central system, available via the internet, for registering officially licensed versions of software to prove ownership

D.

a ledger for maintaining accurate and up-to-date information on total disk usage and disk space remaining available to the operating system

Buy Now
Questions 27

What does the following output tell us?

XDR-Analyst Question 27

Options:

A.

There is one low severity incident.

B.

Host shpapy_win10 had the most vulnerabilities.

C.

There is one informational severity alert.

D.

This is an actual output of the Top 10 hosts with the most malware.

Buy Now
Exam Code: XDR-Analyst
Exam Name: Palo Alto Networks XDR Analyst
Last Update: Dec 12, 2025
Questions: 91

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now XDR-Analyst testing engine

PDF (Q&A)

$43.57  $124.49
buy now XDR-Analyst pdf