Q: 1
Which interval is the duration of time before an analytics detector can raise an alert?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
Based on the image below, which two additional steps should a SOC analyst take to secure the
endpoint? (Choose two.)


Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
During an investigation of an alert with a completed playbook, it is determined that no indicators
exist from the email "[email protected]" in the Key Assets & Artifacts tab of the parent incident.
Which command will determine if Cortex XSIAM has been configured to extract indicators as
expected?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
Why would an analyst schedule an XQL query?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
When a sub-playbook loops, which task tab will allow an analyst to determine what data the sub-
playbook used in each iteration of the loop?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
An analyst is responding to a critical incident involving a potential ransomware attack. The analyst
immediately initiates full isolation on the compromised endpoint using Cortex XSIAM to prevent the
malware from spreading across the network. However, the analyst now needs to collect additional
forensic evidence from the isolated machine, including memory dumps and disk images without
reconnecting it to the network. Which action will allow the analyst to collect the required forensic
evidence while ensuring the endpoint remains fully isolated?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
While investigating an alert, an analyst notices that a URL indicator has a related alert from a
previous incident. The related alert has the same URL but it resolved to a different IP address.
Which combination of two actions should the analyst take to resolve this issue? (Choose two.)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
An incident in Cortex XSIAM contains the following series of alerts:
10:24:17 AM - Informational Severity - XDR Analytics BIOC - Rare process execution in organization
10:24:18 AM - Low Severity - XDR BIOC - Suspicious AMSI DLL load location
10:24:20 AM - Medium Severity - XDR Agent - WildFire Malware
11:57:04 AM - High Severity - Correlation - Suspicious admin account creation
Which alert was responsible for the creation of the incident?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
Which attributes can be used as featured fields?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 10
Two security analysts are collaborating on complex but similar incidents. The first analyst merges the
two incidents into one for easier management. The other analyst immediately discovers that the
custom incident field values relevant to the investigation are missing.
How can the team retrieve the missing details?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2