Q: 11
Which two outcomes can result from custom prioritization configuration? (Choose two)
Options
Discussion
I saw something similar in a recent practice, went with C and D.
Seen this before, it's definitely A and B. Custom prioritization is about tweaking alert severity and focusing on the most important assets, not auto-removing false positives or spinning up new playbooks. Pretty sure that's how XDR works.
A and B here, not C. Custom prioritization tweaks severity and asset focus, but it doesn't automatically eliminate false positives. Saw this in a practice test, but happy to be challenged if someone has seen C work differently.
C or D for me, since custom prioritization might allow you to get rid of noisy alerts or set up new workflows. Not positive, but both seem close to what config changes could do here.
A/B imo. Prioritization configs let you bump severity for certain alert types and make sure assets that matter most get flagged higher. Seen this in some practice tests and the official docs mention both these outcomes. Not 100% but seems pretty standard for XDR. If anyone knows from labs, let us know.
A/B? Not totally sure but both sound like what custom prioritization is meant for.
A and B. Clear question, saw similar on practice tests.
Be respectful. No spam.
Q: 12
The causality chain in Cortex XDR helps analysts:
Options
Discussion
Probably B, causality chain is that visual timeline of linked events. Not for licensing or auto playbooks, just seeing how stuff unfolded. Makes more sense than D here.
Seriously why is Palo Alto obsessed with visualization? Wouldn't D make more sense with alert handling?
Makes sense to pick D for prioritizing alerts, since analysts need to focus on what’s critical first.
B here, not D. Causality chain really just maps out the order of related events, not alert priority or licensing stuff.
I don’t think D is right here. B lines up because the causality chain just connects all those related events, so you can actually see what led up to an incident. Not totally sure but that's how I've seen it used.
Be respectful. No spam.
Q: 13
Why is the timeline view useful during investigations?
Options
Discussion
Really clear question, nice. A is right since the timeline helps see each event in order, making it easier to piece together how the attack unfolded. Pretty sure that's what most exam reports say too.
A but I get why some think D, the timeline is mainly about order not grouping.
Pretty sure D. Grouping alerts into different incidents feels like what you’d use a timeline view for, right?
Its D doesn’t sound right since grouping alerts is different from seeing them in order. I think A makes more sense because timeline view is about connecting events step by step. Not 100% sure though, somebody else agree?
Be respectful. No spam.
Q: 14
Which agent operational state indicates the endpoint is installed but not actively enforcing protection?
Options
Discussion
Makes sense, option C. Disabled is when the agent is there but protections are off. Disconnected still enforces, just not updating.
Why wouldn't it be B? If it's disconnected, doesn't that mean it's not enforcing protection?
C , Disabled means agent is installed but not actually protecting the endpoint.
Be respectful. No spam.
Q: 15
Which two functions are supported in XQL queries? (Choose two)
Options
Discussion
C/D? I saw similar wording on some practice sets, so I'd check the official docs for exact XQL function support.
A/B imo, since COUNT() and SUM() are actual aggregation functions in XQL. PATCH() and REMEDIATE() sound like response actions, not things you'd use inside a query. Seen this trip up folks before.
PATCH and REMEDIATE are for response actions but not query functions, so A and B.
A/B here, PATCH and REMEDIATE are actions not queries so those are the trap answers. Seen similar question on other practice sets.
A and B tbh. XQL uses COUNT() and SUM() for aggregation, but PATCH() and REMEDIATE() are more for actions not queries. Seen similar picks on practice tests.
Be respectful. No spam.
Q: 16
Which Cortex XDR feature enables automated responses to certain threats?
Options
Discussion
It’s A, Playbooks integrated with XSOAR. XSOAR playbooks are the only option here that triggers actual automated response actions in Cortex XDR. The others are manual steps or config tweaks, not automation. D (exclusion rules) looks tempting but doesn’t handle responses to threats dynamically. Seen this on other practice tests too.
A tbh, since only playbooks with XSOAR let you automate real security responses like isolating hosts or blocking indicators. The rest (B, C, D) are more for tuning or manual actions. Not 100 percent sure if the exam ever tries to twist this, but all docs point at A.
A is the one that does actual automation since playbooks in XSOAR trigger real response actions. The other choices are either manual or just change settings, not automated. Pretty sure about this, but open if anyone has seen something different on the exam.
A
D
A imo, since playbooks with XSOAR are what automate responses in Cortex XDR. Other options are manual or config changes only. Clear and to the point question.
Be respectful. No spam.
Q: 17
Which of the following can be configured in a prevention policy but not in an extension profile?
Options
Discussion
Its A. You can only set malware blocking rules in a prevention policy, not in an extension profile. Extension (agent settings) profiles are more about agent operations and enabling modules, but malware rules specifically live inside the prevention policy. Pretty sure this lines up with how Cortex XDR splits configuration. Correct me if I’m off!
A for sure. Had something like this in a mock, malware blocking is only configurable in the prevention policy, not within extension (agent settings) profiles. Host firewall and device control stuff can go in agent profiles but malware prevention needs its own policy. If I missed some hidden feature let me know, but pretty confident here.
I thought it was C, since host firewall stuff needs special handling and sometimes those settings aren't in the same place as prevention controls. Saw a similar split between firewall and prevention on other tools too, but not 100%.
Probably A, saw a similar question in practice exams and malware blocking rules are set via prevention policy only.
Be respectful. No spam.
Q: 18
What type of data source is xdr_data considered?
Options
Discussion
Its B since xdr_data could be seen as incident-related when filtered by use case. If they're focusing on dataset roles during investigations instead of raw logs, then summary fits better. Open to correction if I'm missing something.
D imo. B looks tempting since incidents are summarized, but xdr_data is actually more about the foundational raw logs per exam reports.
B tbh
Be respectful. No spam.
Q: 19
When building an IOC hunting query, analysts should focus on:
Options
Discussion
Option A, had something like this in a mock. IOC hunts always target known bad domains or hashes.
Nah, not B-alert starring is a trap. It's A for IOC hunts.
A
Its A, seen similar in practice Qs, has to be known bad hashes or domains for IOC hunting.
A , since only known bad domains or hashes actually give you something concrete to search for with IOC hunting queries.
D
Be respectful. No spam.
Q: 20
Which two components influence the incident score in Cortex XDR? (Choose two)
Options
Discussion
C/B here. Official guide and labs both point out that alert severity and number of correlated alerts are what actually drive the score in XDR. D and C don't influence it afaik but double check practice tests if unsure.
A and B imo. Alert severity levels drive the score and more correlated alerts stack up risk too. C and D don't actually move the incident score in XDR, at least as far as docs explain. Anybody see different on a live environment?
A and B, not D. Data source type doesn't impact the incident score itself.
Its D, seen a similar question in the practice test and official guide.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2