New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

XDR-Analyst Palo Alto Networks XDR Analyst Questions and Answers

Questions 4

To stop a network-based attack, any interference with a portion of the attack pattern is enough to prevent it from succeeding. Which statement is correct regarding the Cortex XDR Analytics module?

Options:

A.

It does not interfere with any portion of the pattern on the endpoint.

B.

It interferes with the pattern as soon as it is observed by the firewall.

C.

It does not need to interfere with the any portion of the pattern to prevent the attack.

D.

It interferes with the pattern as soon as it is observed on the endpoint.

Buy Now
Questions 5

What kind of the threat typically encrypts user files?

Options:

A.

ransomware

B.

SQL injection attacks

C.

Zero-day exploits

D.

supply-chain attacks

Buy Now
Questions 6

Which search methods is supported by File Search and Destroy?

Options:

A.

File Seek and Destroy

B.

File Search and Destroy

C.

File Seek and Repair

D.

File Search and Repair

Buy Now
Questions 7

What is the Wildfire analysis file size limit for Windows PE files?

Options:

A.

No Limit

B.

500MB

C.

100MB

D.

1GB

Buy Now
Questions 8

When creating a BIOC rule, which XQL query can be used?

Options:

A.

dataset = xdr_data

| filter event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

B.

dataset = xdr_data

| filter event_type = PROCESS and

event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

C.

dataset = xdr_data

| filter action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

| fields action_process_image

D.

dataset = xdr_data

| filter event_behavior = true

event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

Buy Now
Questions 9

Which built-in dashboard would be the best option for an executive, if they were looking for the Mean Time to Resolution (MTTR) metric?

Options:

A.

Security Manager Dashboard

B.

Data Ingestion Dashboard

C.

Security Admin Dashboard

D.

Incident Management Dashboard

Buy Now
Questions 10

How does Cortex XDR agent for Windows prevent ransomware attacks from compromising the file system?

Options:

A.

by encrypting the disk first.

B.

by utilizing decoy Files.

C.

by retrieving the encryption key.

D.

by patching vulnerable applications.

Buy Now
Questions 11

As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to open a malicious Word document. You learn from the WildFire report and AutoFocus that this document is known to have been used in Phishing campaigns since 2018. What steps can you take to ensure that the same document is not opened by other users in your organization protected by the Cortex XDR agent?

Options:

A.

Enable DLL Protection on all endpoints but there might be some false positives.

B.

Create Behavioral Threat Protection (BTP) rules to recognize and prevent the activity.

C.

No step is required because Cortex shares IOCs with our fellow Cyber Threat Alliance members.

D.

No step is required because the malicious document is already stopped.

Buy Now
Questions 12

A Linux endpoint with a Cortex XDR Pro per Endpoint license and Enhanced Endpoint Data enabled has reported malicious activity, resulting in the creation of a file that you wish to delete. Which action could you take to delete the file?

Options:

A.

Manually remediate the problem on the endpoint in question.

B.

Open X2go from the Cortex XDR console and delete the file via X2go.

C.

Initiate Remediate Suggestions to automatically delete the file.

D.

Open an NFS connection from the Cortex XDR console and delete the file.

Buy Now
Questions 13

Which two types of exception profiles you can create in Cortex XDR? (Choose two.)

Options:

A.

exception profiles that apply to specific endpoints

B.

agent exception profiles that apply to specific endpoints

C.

global exception profiles that apply to all endpoints

D.

role-based profiles that apply to specific endpoints

Buy Now
Questions 14

Which Exploit Protection Module (EPM) can be used to prevent attacks based on OS function?

Options:

A.

UASLR

B.

JIT Mitigation

C.

Memory Limit Heap Spray Check

D.

DLL Security

Buy Now
Questions 15

What is the function of WildFire for Cortex XDR?

Options:

A.

WildFire runs in the cloud and analyses alert data from the XDR agent to check for behavioural threats.

B.

WildFire is the engine that runs on the local agent and determines whether behavioural threats are occurring on the endpoint.

C.

WildFire accepts and analyses a sample to provide a verdict.

D.

WildFire runs entirely on the agent to quickly analyse samples and provide a verdict.

Buy Now
Questions 16

Which statement is true for Application Exploits and Kernel Exploits?

Options:

A.

The ultimate goal of any exploit is to reach the application.

B.

Kernel exploits are easier to prevent then application exploits.

C.

The ultimate goal of any exploit is to reach the kernel.

D.

Application exploits leverage kernel vulnerability.

Buy Now
Questions 17

Which type of BIOC rule is currently available in Cortex XDR?

Options:

A.

Threat Actor

B.

Discovery

C.

Network

D.

Dropper

Buy Now
Questions 18

What is the outcome of creating and implementing an alert exclusion?

Options:

A.

The Cortex XDR agent will allow the process that was blocked to run on the endpoint.

B.

The Cortex XDR console will hide those alerts.

C.

The Cortex XDR agent will not create an alert for this event in the future.

D.

The Cortex XDR console will delete those alerts and block ingestion of them in the future.

Buy Now
Questions 19

What is the difference between presets and datasets in XQL?

Options:

A.

A dataset is a Cortex data lake data source only; presets are built-in data source.

B.

A dataset is a built-in or third-party source; presets group XDR data fields.

C.

A dataset is a database; presets is a field.

D.

A dataset is a third-party data source; presets are built-in data source.

Buy Now
Questions 20

What does the following output tell us?

Options:

A.

There is one low severity incident.

B.

Host shpapy_win10 had the most vulnerabilities.

C.

There is one informational severity alert.

D.

This is an actual output of the Top 10 hosts with the most malware.

Buy Now
Questions 21

What is the purpose of the Cortex Data Lake?

Options:

A.

a local storage facility where your logs and alert data can be aggregated

B.

a cloud-based storage facility where your firewall logs are stored

C.

the interface between firewalls and the Cortex XDR agents

D.

the workspace for your Cortex XDR agents to detonate potential malware files

Buy Now
Questions 22

Which version of python is used in live terminal?

Options:

A.

Python 2 and 3 with standard Python libraries

B.

Python 2 and 3 with specific XDR Python libraries developed by Palo Alto Networks

C.

Python 3 with specific XDR Python libraries developed by Palo Alto Networks

D.

Python 3 with standard Python libraries

Buy Now
Questions 23

As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to download Cobalt Strike on one of your servers. Days later, you learn about a massive ongoing supply chain attack. Using Cortex XDR you recognize that your server was compromised by the attack and that Cortex XDR prevented it. What steps can you take to ensure that the same protection is extended to all your servers?

Options:

A.

Create Behavioral Threat Protection (BTP) rules to recognize and prevent the activity.

B.

Enable DLL Protection on all servers but there might be some false positives.

C.

Create IOCs of the malicious files you have found to prevent their execution.

D.

Enable Behavioral Threat Protection (BTP) with cytool to prevent the attack from spreading.

Buy Now
Questions 24

Which type of IOC can you define in Cortex XDR?

Options:

A.

Destination IP Address

B.

Source IP Address

C.

Source port

D.

Destination IP Address: Destination

Buy Now
Questions 25

What kind of malware uses encryption, data theft, denial of service, and possibly harassment to take advantage of a victim?

Options:

A.

Ransomware

B.

Worm

C.

Keylogger

D.

Rootkit

Buy Now
Questions 26

Which of the following is an example of a successful exploit?

Options:

A.

connecting unknown media to an endpoint that copied malware due to Autorun.

B.

a user executing code which takes advantage of a vulnerability on a local service.

C.

identifying vulnerable services on a server.

D.

executing a process executable for well-known and signed software.

Buy Now
Questions 27

Where would you go to add an exception to exclude a specific file hash from examination by the Malware profile for a Windows endpoint?

Options:

A.

Find the Malware profile attached to the endpoint, Under Portable Executable and DLL Examination add the hash to the allow list.

B.

From the rules menu select new exception, fill out the criteria, choose the scope to apply it to, hit save.

C.

Find the exceptions profile attached to the endpoint, under process exceptions select local analysis, paste the hash and save.

D.

In the Action Center, choose Allow list, select new action, select add to allow list, add your hash to the list, and apply it.

Buy Now
Exam Code: XDR-Analyst
Exam Name: Palo Alto Networks XDR Analyst
Last Update: Dec 14, 2025
Questions: 91
XDR-Analyst pdf

XDR-Analyst PDF

$25.5  $84.99
XDR-Analyst Engine

XDR-Analyst Testing Engine

$30  $99.99
XDR-Analyst PDF + Engine

XDR-Analyst PDF + Testing Engine

$40.5  $134.99