Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

XDR-Engineer Palo Alto Networks XDR Engineer Questions and Answers

Questions 4

A correlation rule is created to detect potential insider threats by correlating user login events from one dataset with file access events from another dataset. The rule must retain all user login events, even if there are no matching file access events, to ensure no login activity is missed.

text

Copy

dataset = x

| join (dataset = y)

Which type of join is required to maintain all records from dataset x, even if there are no matching events from dataset y?

Options:

A.

Inner

B.

Left

C.

Right

D.

Outer

Buy Now
Questions 5

When using Kerberos as the authentication method for Pathfinder, which two settings must be validated on the DNS server? (Choose two.)

Options:

A.

DNS forwarders

B.

Reverse DNS zone

C.

Reverse DNS records

D.

AD DS-integrated zones

Buy Now
Questions 6

What will enable a custom prevention rule to block specific behavior?

Options:

A.

A correlation rule added to an Agent Blocking profile

B.

A custom behavioral indicator of compromise (BIOC) added to an Exploit profile

C.

A custom behavioral indicator of compromise (BIOC) added to a Restriction profile

D.

A correlation rule added to a Malware profile

Buy Now
Questions 7

Multiple remote desktop users complain of in-house applications no longer working. The team uses macOS with Cortex XDR agents version 8.7.0, and the applications were previously allowed by disable prevention rules attached to the Exceptions Profile "Engineer-Mac." Based on the images below, what is a reason for this behavior?

Options:

A.

Endpoint IP address changed from 192.168.0.0 range to 192.168.100.0 range

B.

The Cloud Identity Engine is disconnected or removed

C.

XDR agent version was downgraded from 8.7.0 to 8.4.0

D.

Installation type changed from VDI to Kubernetes

Buy Now
Questions 8

Which two steps should be considered when configuring the Cortex XDR agent for a sensitive and highly regulated environment? (Choose two.)

Options:

A.

Enable critical environment versions

B.

Create an agent settings profile where the agent upgrade scope is maintenance releases only

C.

Create an agent settings profile, enable content auto-update, and include a delay of four days

D.

Enable minor content version updates

Buy Now
Questions 9

Using the Cortex XDR console, how can additional network access be allowed from a set of IP addresses to an isolated endpoint?

Options:

A.

Add entries in Configuration section of Security Settings

B.

Add entries in the Allowed Domains section of Security Settings for the tenant

C.

Add entries in Exceptions Configuration section of Isolation Exceptions

D.

Add entries in Response Actions section of Agent Settings profile

Buy Now
Questions 10

What happens when the XDR Collector is uninstalled from an endpoint by using the Cortex XDR console?

Options:

A.

The files are removed immediately, and the machine is deleted from the system without any retention period

B.

The machine status remains active until manually removed, and the configuration data is retained for up to seven days

C.

It is uninstalled during the next heartbeat communication, machine status changes to Uninstalled, and the configuration data is retained for 90 days

D.

The associated configuration data is removed from the Action Center immediately after uninstallation

Buy Now
Questions 11

Based on the Malware profile image below, what happens when a new custom-developed application attempts to execute on an endpoint?

Options:

A.

It will immediately execute

B.

It will not execute

C.

It will execute after one hour

D.

It will execute after the second attempt

Buy Now
Questions 12

What is the earliest time frame an alert could be automatically generated once the conditions of a new correlation rule are met?

Options:

A.

Between 30 and 45 minutes

B.

Immediately

C.

5 minutes or less

D.

Between 10 and 20 minutes

Buy Now
Questions 13

An XDR engineer is creating a correlation rule to monitor login activity on specific systems. When the activity is identified, an alert is created. The alerts are being generated properly but are missing the username when viewed. How can the username information be included in the alerts?

Options:

A.

Select “Initial Access” in the MITRE ATT&CK mapping to include the username

B.

Update the query in the correlation rule to include the username field

C.

Add a mapping for the username field in the alert fields mapping

D.

Add a drill-down query to the alert which pulls the username field

Buy Now
Questions 14

How are dynamic endpoint groups created and managed in Cortex XDR?

Options:

A.

Endpoint groups require intervention to update the group with new endpoints when a new device is added to the network

B.

Each endpoint can belong to multiple groups simultaneously, allowing different security policies to be applied to the same device at the same time

C.

After an endpoint group is created, its assigned security policy cannot be changed without deleting and recreating the group

D.

Endpoint groups are defined based on fields such as OS type, OS version, and network segment

Buy Now
Questions 15

An administrator wants to employ reusable rules within custom parsing rules to apply consistent log field extraction across multiple data sources. Which section of the parsing rule should the administrator use to define those reusable rules in Cortex XDR?

Options:

A.

RULE

B.

INGEST

C.

FILTER

D.

CONST

Buy Now
Exam Code: XDR-Engineer
Exam Name: Palo Alto Networks XDR Engineer
Last Update: May 18, 2025
Questions: 50
XDR-Engineer pdf

XDR-Engineer PDF

$29.75  $84.99
XDR-Engineer Engine

XDR-Engineer Testing Engine

$35  $99.99
XDR-Engineer PDF + Engine

XDR-Engineer PDF + Testing Engine

$47.25  $134.99