Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

PSE-Cortex Palo Alto Networks System Engineer - Cortex Professional Questions and Answers

Questions 4

Which product enables the discovery, exchange, and contribution of security automation playbooks, built into Cortex XSOAR?

Options:

A.

XSOAR Threat Intelligence Platform (TIP)

B.

XSOAR Automated Systems

C.

XSOAR Ticketing Systems

D.

XSOAR Marketplace

Buy Now
Questions 5

A customer is hesitant to directly connect their network to the Cortex platform due to compliance restrictions.

Which deployment method should the customer use to ensure secure connectivity between their network and the Cortex platform?

Options:

A.

Elasticsearch

B.

Broker VM

C.

Syslog collector

D.

Windows Event Collector

Buy Now
Questions 6

Which attack method is a result of techniques designed to gain access through vulnerabilities in the code of an operating system (OS) or application?

Options:

A.

exploit

B.

malware

C.

phishing

D.

ransomware

Buy Now
Questions 7

Which two actions are required to add indicators to the whitelist? (Choose two.)

Options:

A.

Click "New Whitelisted Indicator" in the Whitelist page.

B.

Upload an external file named "whitelist" to the Whitelist page.

C.

Upload an external file named "whitelist" to the Indicators page.

D.

Select the indicators and click "Delete and Whitelist" in the Indicators page.

Buy Now
Questions 8

Which option is required to prepare the VDI Golden Image?

Options:

A.

Configure the Golden Image as a persistent VDI

B.

Use the Cortex XDR VDI tool to obtain verdicts for all PE files

C.

Install the Cortex XOR Agent on the local machine

D.

Run the Cortex VDI conversion tool

Buy Now
Questions 9

Which command-line interface (CLI) query would retrieve the last three Splunk events?

Options:

A.

!search using=splunk_instance_1 query="* | last 3"

B.

!search using=splunk_instance_1 query="* | 3"

C.

!query using=splunk_instance_1 query="* | last 3"

D.

!search using=splunk_instance_1 query="* | head 3"

Buy Now
Questions 10

What does the Cortex XSOAR "Saved by Dbot" widget calculate?

Options:

A.

amount saved in Dollars according to actions carried out by all users in Cortex XSOAR across all incidents

B.

amount saved in Dollars by using Cortex XSOAR instead of other products

C.

amount of time saved by each playbook task within an incident

D.

amount of time saved by Dbot's machine learning (ML) capabilities

Buy Now
Questions 11

For which two purposes can Cortex XSOAR engines be deployed? (Choose two.)

Options:

A.

To execute recurring daybooks based on specific time schedules or changed to a feed

B.

To add processing resources for a heavily-used integration via load-balancing groups.

C.

To integrate with tools in a network location that the Cortex XSOAR server cannot reach directly

D.

To connect Cortex XSOAR to all required Palo Alto Networks resources such as the Cortex Gateway

Buy Now
Questions 12

A Cortex XSOAR customer has a phishing use case in which a playbook has been implemented with one of the steps blocking a malicious URL found in an email reported by one of the users.

What would be the appropriate next step in the playbook?

Options:

A.

Email the CISO to advise that malicious email was found.

B.

Disable the user's email account.

C.

Email the user to confirm the reported email was phishing.

D.

Change the user's password.

Buy Now
Questions 13

When preparing the golden image in a Cortex XDR Virtual Desktop Infrastructure (VDI) deployment, which step is required?

Options:

A.

Disable automatic memory dumps.

B.

Scan the image using the imagepreptool.

C.

Launch the VDI conversion tool.

D.

Enable the VDI license timeout.

Buy Now
Questions 14

Which action should be performed by every Cortex Xpanse proof of value (POV)?

Options:

A.

Grant the customer access to the management console immediately following activation.

B.

Provide the customer with an export of all findings at the conclusion of the POV.

C.

Enable all of the attach surface rules to show the highest number of alerts.

D.

Review the mapping in advance to identity a few interesting findings to share with the customer.

Buy Now
Questions 15

A Cortex XSOAR customer wants to ingest emails from a single mailbox. The mailbox brings in reported phishing emails and email requests from human resources (HR) to onboard new users. The customer wants to run two separate workflows from this mailbox, one for phishing and one for onboarding.

What will allow Cortex XSOAR to accomplish this in the most efficient way?

Options:

A.

Create two instances of the email integration and classify one instance as ingesting incidents of type phishing and the other as ingesting incidents of type onboarding.

B.

Use an incident classifier based on a field in each type of email to classify those containing "Phish Alert" in the subject as phishing and those containing "Onboard Request" as onboarding.

C.

Create a playbook to process and determine incident type based on content of the email.

D.

Use machine learning (ML) to determine incident type.

Buy Now
Questions 16

What allows the use of predetermined Palo Alto Networks roles to assign access rights to Cortex XDR users?

Options:

A.

role-based access control

B.

cloud identity engine

C.

endpoint groups

D.

restrictions security profile

Buy Now
Questions 17

A prospective customer is interested in Cortex XDR but is enable to run a product evaluation.

Which tool can be used instead to showcase Cortex XDR?

Options:

A.

Test Flight

B.

War Game

C.

Tech Rehearsal

D.

Capture the Flag

Buy Now
Questions 18

Which two troubleshooting steps should be taken when an integration is failing to connect? (Choose two.)

Options:

A.

Ensure the playbook is set to run in quiet mode to minimize CPU usage and suppress errors

B.

Confirm the integration credentials or API keys are valid.

C.

Check the integration logs and enable a higher logging level, if needed, view the specific error.

D.

Confirm there are no dashboards or reports configured to use that integration instance.

Buy Now
Questions 19

Rearrange the steps into the correct order for modifying an incident layout.

Options:

Buy Now
Questions 20

Which two types of indicators of compromise (IOCs) are available for creation in Cortex XDR? (Choose two.)

Options:

A.

registry

B.

file path

C.

hash

D.

hostname

Buy Now
Questions 21

Which type of log is ingested natively in Cortex XDR Pro per TB?

Options:

A.

Google Kubernetes Engine

B.

Demisto

C.

Docker

D.

Microsoft Office 365

Buy Now
Questions 22

What is a key difference between audit users and full users in Cortex XSOAR?

Options:

A.

Audit users can only view incidents, while full users can edit system components.

B.

Full users can only view dashboards, while audit users can investigate incidents.

C.

Audit users have read-only permission, white full users have read-write permission.

D.

Audit users can run scripts and playbooks, while full users can only view reports.

Buy Now
Questions 23

Which aspect of Cortex Xpanse allows for visibility over remote workforce risks?

Options:

A.

The ability to identify customer assets on residential networks

B.

The use of a VPN connection to scan remote devices

C.

The deployment of a Cortex Xpanse aqent on the remote endpoint

D.

The presence of a portal for remote workers to use for posture checking

Buy Now
Questions 24

How does a clear understanding of a customer’s technical expertise assist in a hand off following the close of an opportunity?

Options:

A.

It enables customers to prepare for audits so they can demonstrate compliance.

B.

It helps in assigning additional technical tasks to the customer

C.

It allows implementation teams to bypass initial scoping exercises

D.

It enables post-sales teams to tailor their support and training appropriately

Buy Now
Questions 25

What is the size of the free Cortex Data Lake instance provided to a customer who has activated a TMS tenant, but has not purchased a Cortex Data Lake instance?

Options:

A.

10 GB

B.

1 TB

C.

10 TB

D.

100 GB

Buy Now
Questions 26

What does Cortex Xpanse ingest from XDR endpoints?

Options:

A.

MAC addresses

B.

User-agent data

C.

Public IP addresses

D.

Hostnames

Buy Now
Questions 27

In Cortex XDR Prevent, which three matching criteria can be used to dynamically group endpoints? (Choose three )

Options:

A.

alert root cause

B.

hostname

C.

domain/workgroup membership

D.

OS

E.

presence of Flash executable

Buy Now
Questions 28

Given the exception thrown in the accompanying image by the Demisto REST API integration, which action would most likely solve the problem?

Which two playbook functionalities allow looping through a group of tasks during playbook execution? (Choose two.)

Options:

A.

Generic Polling Automation Playbook

B.

Playbook Tasks

C.

Sub-Play books

D.

Playbook Functions

Buy Now
Questions 29

Which method is used for third-party network data consumption?

Options:

A.

scripts library from the action center

B.

Open Database Connectivity (ODBC) connection to network device database

C.

Common Event Format (CEF) via broker Syslog module

D.

file reader to the /var/log/messages file on the device

Buy Now
Questions 30

Which Cortex XSIAM license is required if an organization needs to protect a cloud Kubernetes host?

Options:

A.

Attack Surface Management

B.

Cortex XSIAM Enterprise

C.

Identity Threat Detection and Response

D.

Cortex XSIAM Enterprise Plus

Buy Now
Questions 31

Why is it important to document notes from the Proof of Value (POV) for post-sales hand off?

Options:

A.

To generate additional training material for the POV’s production implementation

B.

To certify that the POV was completed and meets all customer requirements

C.

To allow implementation teams to bypass scooping exercises and shorten delivery time

D.

To ensure the implementation teams understand the customer use cases and priorities

Buy Now
Questions 32

In the DBotScore context field, which context key would differentiate between multiple entries for the same indicator in a multi-TIP environment?

Options:

A.

Vendor

B.

Type

C.

Using

D.

Brand

Buy Now
Questions 33

Which two Cortex XSOAR incident type features can be customized under Settings > Advanced > Incident Types? (Choose two.)

Options:

A.

adding new fields to an incident type

B.

setting reminders for an incident service level agreement

C.

defining whether a playbook runs automatically when an incident type is encountered

D.

dropping new incidents of the same type that contain similar information

Buy Now
Questions 34

When initiated, which Cortex XDR capability allows immediate termination of the process-or entire process tree-on an anomalous process discovered during investigation of a security event?

Options:

A.

Live sensors

B.

Live terminal

C.

Log forwarding

D.

Log stitching

Buy Now
Questions 35

When preparing for a Cortex XSOAR proof of value (POV), which task should be performed before the evaluation is requested?

Options:

A.

Ensuring that the customer has single sign-on (SSO) configured in their environment

B.

Building out an executive-IeveI proposal detailing the product capabilities

C.

Planning for every different use case the customer has for the solution

D.

Gathering a list of the different integrations that will need to be configured

Buy Now
Questions 36

Which CLI query would bring back Notable Events from Splunk?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 37

A customer has purchased Cortex Data Lake storage with the following configuration, which requires 2 TB of Cortex Data Lake to order:

support for 300 total Cortex XDR clients all forwarding Cortex XDR data with 30-day retention

storage for higher fidelity logs to support Cortex XDR advanced analytics

The customer now needs 1000 total Cortex XDR clients, but continues with 300 clients forwarding Cortex XDR data with 30-day retention.

What is the new total storage requirement for Cortex Data Lake storage to order?

Options:

A.

16 TB

B.

4 TB

C.

8 TB

D.

2 TB

Buy Now
Questions 38

Which option describes a Load-Balancing Engine Group?

Options:

A.

A group of engines that use an algorithm to efficiently share the workload for integrations

B.

A group of engines that ensure High Availability of Demisto backend databases.

C.

A group of engines that use an algorithm to efficiently share the workload for automation scripts

D.

A group of D2 agents that share processing power across multiple endpoints

Buy Now
Questions 39

In addition to migration and go-live, what are two best-practice steps for migrating from SIEM to Cortex XSIAM? (Choose two.)

Options:

A.

Execution

B.

Certification

C.

Conclusion

D.

Testing

Buy Now
Questions 40

How can the required log ingestion license be determined when sizing a Cortex XSIAM deployment?

Options:

A.

Use the Cortex Data Lake Calculator to estimate the volume of third-party logs.

B.

Count the number of correlation sources and multiply by desired retention days.

C.

Ask the customer for average log ingestion estimates from their existing SIEM.

D.

Ask the customer to provide average daily alert volume.

Buy Now
Questions 41

A customer has purchased Cortex XSOAR and has a need to rapidly stand up the product in their environment. The customer has stated that their internal staff are currently occupied with other projects.

Which Palo Alto Networks service offering should be recommended to the customer?

Options:

A.

Deployment

B.

Onboardinq

C.

Fast-Track

D.

QuickStart

Buy Now
Questions 42

Which Linux OS command will manually load Docker images onto the Cortex XSOAR server in an air-gapped environment?

Options:

A.

sudo repoquery -a --installed

B.

sudo demistoserver-x.x-xxxx.sh -- -tools=load

C.

sudo docker ps load

D.

sudo docker load -i YOUR_DOCKER_FILE.tar

Buy Now
Questions 43

A customer has purchased Cortex XDR and requires phone support for the product.

Which Palo Alto Networks offering would fulfill this need?

Options:

A.

Platinum Success

B.

Premium Success

C.

Diamond Success

D.

Standard Success

Buy Now
Questions 44

A prospect has agreed to do a 30-day POC and asked to integrate with a product that Demisto currently does not have an integration with. How should you respond?

Options:

A.

Extend the POC window to allow the solution architects to build it

B.

Tell them we can build it with Professional Services.

C.

Tell them custom integrations are not created as part of the POC

D.

Agree to build the integration as part of the POC

Buy Now
Questions 45

Cortex XSOAR has extracted a malicious Internet Protocol (IP) address involved in command-and-control (C2) traffic.

What is the best method to block this IP from communicating with endpoints without requiring a configuration change on the firewall?

Options:

A.

Have XSOAR automatically add the IP address to a threat intelligence management (TIM) malicious IP list to elevate priority of future alerts.

B.

Have XSOAR automatically add the IP address to a deny rule in the firewall.

C.

Have XSOAR automatically add the IP address to an external dynamic list (EDL) used by the firewall.

D.

Have XSOAR automatically create a NetOps ticket requesting a configuration change to the firewall to block the IP.

Buy Now
Questions 46

An administrator of a Cortex XDR protected production environment would like to test its ability to protect users from a known flash player exploit.

What is the safest way to do it?

Options:

A.

The administrator should attach a copy of the weapomzed flash file to an email, send the email to a selected group of employees, and monitor the Events tab on the Cortex XDR console

B.

The administrator should use the Cortex XDR tray icon to confirm his corporate laptop is fully protected then open the weaponized flash file on his machine, and monitor the Events tab on the Cortex XDR console.

C.

The administrator should create a non-production Cortex XDR test environment that accurately represents the production environment, introduce the weaponized flash file, and monitor the Events tab on the Cortex XDR console.

D.

The administrator should place a copy of the weaponized flash file on several USB drives, scatter them around the office and monitor the Events tab on the Cortex XDR console

Buy Now
Questions 47

Which two entities can be created as a BIOC? (Choose two.)

Options:

A.

file

B.

registry

C.

event log

D.

alert log

Buy Now
Questions 48

Which task setting allows context output to a specific key?

Options:

A.

extend context

B.

stop on errors

C.

task output

D.

lags

Buy Now
Questions 49

Given the integration configuration and error in the screenshot what is the cause of the problem?

Options:

A.

incorrect instance name

B.

incorrect Username and Password

C.

incorrect appliance port

D.

incorrect server URL

Buy Now
Questions 50

Which two statements apply to widgets? (Choose two.)

Options:

A.

All widgets are customizable.

B.

Dashboards cannot be shared across an organization.

C.

A widget can have its own time range that is different from the rest of the dashboard.

D.

Some widgets cannot be changed

Buy Now
Exam Code: PSE-Cortex
Exam Name: Palo Alto Networks System Engineer - Cortex Professional
Last Update: Jun 16, 2025
Questions: 168
PSE-Cortex pdf

PSE-Cortex PDF

$29.75  $84.99
PSE-Cortex Engine

PSE-Cortex Testing Engine

$35  $99.99
PSE-Cortex PDF + Engine

PSE-Cortex PDF + Testing Engine

$47.25  $134.99