XDR Analyst
Q: 1
Why might an analyst use lookup tables in an IOC investigation?
Options
Q: 2
Which two actions should analysts validate after a new agent version deployment? (Choose two)
Options
Q: 3
Which action should analysts take when content update deployment fails?
Options
Q: 4
Which XQL query option allows scheduled reports to be generated automatically?
Options
Q: 5
How do dashboards differ from reports in Cortex XDR?
Options
Q: 6
Which two IOC types can analysts hunt using XQL queries? (Choose two)
Options
Q: 7
What does Host Insights provide analysts?
Options
Q: 8
What is the role of an extension profile in Cortex XDR?
Options
Q: 9
When building an IOC hunting query, analysts should focus on:
Options
Q: 10
What role does data stitching play in incident analysis?
Options
Q: 11
Which Cortex XDR dataset would you query for administrative activities?
Options
Q: 12
Which two forensic artifacts are crucial when reconstructing malware persistence? (Choose two)
Options
Q: 13
When an agent is in a Disabled state, what happens to policy enforcement?
Options
Q: 14
Which two best practices ensure consistent agent security posture? (Choose two)
Options
Q: 15
How does Cortex XDR support forensic investigations after containment?
Options
Q: 16
Which dataset is most appropriate for IOC hunting?
Options
Q: 17
Which two tasks are supported directly through Host Insights? (Choose two)
Options
Q: 18
Which two alert types are most commonly generated by XDR agents on endpoints? (Choose two)
Options
Q: 19
Which two use cases are supported by Host Insights? (Choose two)
Options
Q: 20
Which syntax correctly groups results by a field in XQL?
Options
Q: 21
What does “starring” an alert signify in the Cortex XDR console?
Options
Q: 22
What is a primary use case of lookup tables in Cortex XDR?
Options
Q: 23
What is the purpose of the pre-defined query builder template?
Options
Q: 24
Which two evidence sources are commonly used in Identity Threat Detection and Response (ITDR)?
(Choose two)
Options
Q: 25
When applying endpoint security policies, which two aspects must be considered? (Choose two)
Options
Q: 26
What does the syntax and schema component of XQL define?
Options
Q: 27
Which two methods validate that a content update has been applied successfully? (Choose two)
Options
Q: 28
During the incident creation process, what triggers incident generation?
Options
Q: 29
Which two actions are part of analyzing security events in Cortex XDR? (Choose two)
Options
Q: 30
Which two datasets are commonly used for endpoint-related investigations in Cortex XDR? (Choose two)
Options
Q: 31
What type of report helps CISOs understand overall XDR performance?
Options
Q: 32
Which two activities fall under forensic investigation in Cortex XDR? (Choose two)
Options
Q: 33
How do analysts typically validate incident scope?
Options
Q: 34
Which two actions can be taken immediately when a compromised endpoint is detected? (Choose two)
Options
Q: 35
Which two conditions may justify creating an exclusion for an alert? (Choose two)
Options
Question 1 of 35