New Year Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

XDR-Analyst Palo Alto Networks XDR Analyst Questions and Answers

Questions 4

Which statement best describes how Behavioral Threat Protection (BTP) works?

Options:

A.

BTP injects into known vulnerable processes to detect malicious activity.

B.

BTP runs on the Cortex XDR and distributes behavioral signatures to all agents.

C.

BTP matches EDR data with rules provided by Cortex XDR.

D.

BTP uses machine Learning to recognize malicious activity even if it is not known.

Buy Now
Questions 5

Which type of IOC can you define in Cortex XDR?

Options:

A.

Destination IP Address

B.

Source IP Address

C.

Source port

D.

Destination IP Address: Destination

Buy Now
Questions 6

How can you pivot within a row to Causality view and Timeline views for further investigate?

Options:

A.

Using the Open Card Only

B.

Using the Open Card and Open Timeline actions respectively

C.

You can't pivot within a row to Causality view and Timeline views

D.

Using Open Timeline Actions Only

Buy Now
Questions 7

An attacker tries to load dynamic libraries on macOS from an unsecure location. Which Cortex XDR module can prevent this attack?

Options:

A.

DDL Security

B.

Hot Patch Protection

C.

Kernel Integrity Monitor (KIM)

D.

Dylib Hijacking

Buy Now
Questions 8

With a Cortex XDR Prevent license, which objects are considered to be sensors?

Options:

A.

Syslog servers

B.

Third-Party security devices

C.

Cortex XDR agents

D.

Palo Alto Networks Next-Generation Firewalls

Buy Now
Questions 9

Live Terminal uses which type of protocol to communicate with the agent on the endpoint?

Options:

A.

NetBIOS over TCP

B.

WebSocket

C.

UDP and a random port

D.

TCP, over port 80

Buy Now
Questions 10

When creating a BIOC rule, which XQL query can be used?

Options:

A.

dataset = xdr_data

| filter event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

B.

dataset = xdr_data

| filter event_type = PROCESS and

event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

C.

dataset = xdr_data

| filter action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

| fields action_process_image

D.

dataset = xdr_data

| filter event_behavior = true

event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

Buy Now
Questions 11

What is the standard installation disk space recommended to install a Broker VM?

Options:

A.

1GB disk space

B.

2GB disk space

C.

512GB disk space

D.

256GB disk space

Buy Now
Questions 12

What is by far the most common tactic used by ransomware to shut down a victim’s operation?

Options:

A.

preventing the victim from being able to access APIs to cripple infrastructure

B.

denying traffic out of the victims network until payment is received

C.

restricting access to administrative accounts to the victim

D.

encrypting certain files to prevent access by the victim

Buy Now
Questions 13

What functionality of the Broker VM would you use to ingest third-party firewall logs to the Cortex Data Lake?

Options:

A.

Netflow Collector

B.

Syslog Collector

C.

DB Collector

D.

Pathfinder

Buy Now
Questions 14

As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to download Cobalt Strike on one of your servers. Days later, you learn about a massive ongoing supply chain attack. Using Cortex XDR you recognize that your server was compromised by the attack and that Cortex XDR prevented it. What steps can you take to ensure that the same protection is extended to all your servers?

Options:

A.

Create Behavioral Threat Protection (BTP) rules to recognize and prevent the activity.

B.

Enable DLL Protection on all servers but there might be some false positives.

C.

Create IOCs of the malicious files you have found to prevent their execution.

D.

Enable Behavioral Threat Protection (BTP) with cytool to prevent the attack from spreading.

Buy Now
Questions 15

To create a BIOC rule with XQL query you must at a minimum filter on which field in order for it to be a valid BIOC rule?

Options:

A.

causality_chain

B.

endpoint_name

C.

threat_event

D.

event_type

Buy Now
Questions 16

In the Cortex XDR console, from which two pages are you able to manually perform the agent upgrade action? (Choose two.)

Options:

A.

Asset Management

B.

Agent Installations

C.

Action Center

D.

Endpoint Administration

Buy Now
Questions 17

What does the following output tell us?

Options:

A.

There is one low severity incident.

B.

Host shpapy_win10 had the most vulnerabilities.

C.

There is one informational severity alert.

D.

This is an actual output of the Top 10 hosts with the most malware.

Buy Now
Questions 18

A file is identified as malware by the Local Analysis module whereas WildFire verdict is Benign, Assuming WildFire is accurate. Which statement is correct for the incident?

Options:

A.

It is true positive.

B.

It is false positive.

C.

It is a false negative.

D.

It is true negative.

Buy Now
Questions 19

In Cortex XDR management console scheduled reports can be forwarded to which of the following applications/services?

Options:

A.

Salesforce

B.

Jira

C.

Service Now

D.

Slack

Buy Now
Questions 20

What is an example of an attack vector for ransomware?

Options:

A.

Performing DNS queries for suspicious domains

B.

Performing SSL Decryption on an endpoint

C.

Phishing emails containing malicious attachments

D.

A URL filtering feature enabled on a firewall

Buy Now
Questions 21

Network attacks follow predictable patterns. If you interfere with any portion of this pattern, the attack will be neutralized. Which of the following statements is correct?

Options:

A.

Cortex XDR Analytics allows to interfere with the pattern as soon as it is observed on the firewall.

B.

Cortex XDR Analytics does not interfere with the pattern as soon as it is observed on the endpoint.

C.

Cortex XDR Analytics does not have to interfere with the pattern as soon as it is observed on the endpoint in order to prevent the attack.

D.

Cortex XDR Analytics allows to interfere with the pattern as soon as it is observed on the endpoint.

Buy Now
Questions 22

When is the wss (WebSocket Secure) protocol used?

Options:

A.

when the Cortex XDR agent downloads new security content

B.

when the Cortex XDR agent uploads alert data

C.

when the Cortex XDR agent connects to WildFire to upload files for analysis

D.

when the Cortex XDR agent establishes a bidirectional communication channel

Buy Now
Questions 23

If you have an isolated network that is prevented from connecting to the Cortex Data Lake, which type of Broker VM setup can you use to facilitate the communication?

Options:

A.

Broker VM Pathfinder

B.

Local Agent Proxy

C.

Local Agent Installer and Content Caching

D.

Broker VM Syslog Collector

Buy Now
Questions 24

The Cortex XDR console has triggered an incident, blocking a vitally important piece of software in your organization that is known to be benign. Which of the following options would prevent Cortex XDR from blocking this software in the future, for all endpoints in your organization?

Options:

A.

Create an individual alert exclusion.

B.

Create a global inclusion.

C.

Create an endpoint-specific exception.

D.

Create a global exception.

Buy Now
Questions 25

Which statement is correct based on the report output below?

Options:

A.

Host Inventory Data Collection is enabled.

B.

3,297 total incidents have been detected.

C.

Forensic inventory data collection is enabled.

D.

133 agents have full disk encryption.

Buy Now
Questions 26

Which version of python is used in live terminal?

Options:

A.

Python 2 and 3 with standard Python libraries

B.

Python 2 and 3 with specific XDR Python libraries developed by Palo Alto Networks

C.

Python 3 with specific XDR Python libraries developed by Palo Alto Networks

D.

Python 3 with standard Python libraries

Buy Now
Questions 27

Which search methods is supported by File Search and Destroy?

Options:

A.

File Seek and Destroy

B.

File Search and Destroy

C.

File Seek and Repair

D.

File Search and Repair

Buy Now
Exam Code: XDR-Analyst
Exam Name: Palo Alto Networks XDR Analyst
Last Update: Dec 13, 2025
Questions: 91
XDR-Analyst pdf

XDR-Analyst PDF

$25.5  $84.99
XDR-Analyst Engine

XDR-Analyst Testing Engine

$30  $99.99
XDR-Analyst PDF + Engine

XDR-Analyst PDF + Testing Engine

$40.5  $134.99