Q: 11
A Cortex XSIAM engineer is developing a playbook that uses reputation commands such as '!ip' to
enrich and analyze indicators.
Which statement applies to the use of reputation commands in this scenario?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
Which step must be taken to enable Cloud Identity Engine on Cortex XSIAM?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
A security engineer notices that in the past week ingestion has spiked significantly. Upon
investigating the anomaly, it is determined that a custom application developed in-house caused the
spike. The custom application is sending syslog to the Broker VM Syslog Collector applet. The
engineer consults with the SOC analyst, who determines that 90% of the logs from the custom
application are not used.
What can the engineer configure to reduce the ingestion?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 14
A vulnerability analyst asks a Cortex XSIAM engineer to identify assets vulnerable to newly reported
zero-day CVE affecting the "ai_app" application and versions 12.1, 12.2, 12.4, and 12.5.
Which XQL query will provide the required result?
A)
B)
C)
D)

B)
C)
D)

Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2