Palo Alto Networks PSE-Cortex Palo Alto Networks System Engineer - Cortex Professional Exam Practice Test

Page: 1 / 14
Total 168 questions
Question 1

How does an "inline" auto-extract task affect playbook execution?



Answer : D


Question 2

An administrator has a critical group of systems running Windows XP SP3 that cannot be upgraded The administrator wants to evaluate the ability of Traps to protect these systems and the word processing applications running on them

How should an administrator perform this evaluation?



Answer : C


Question 3

Within Cortex XSIAM, how does the integration of Attack Surface Management (ASM) provide a unified approach to security event management that traditional SIEMs typically lack?



Answer : D

The integration of Attack Surface Management (ASM) in Cortex XSIAM enriches incidents with ASM data for all internet-facing assets, providing a unified approach to security event management. This integration helps identify and address vulnerabilities related to external assets, offering more context and enhancing the overall security incident response. Traditional SIEMs typically lack this level of integration with external asset visibility.


Question 4

When running a Cortex XSIAM proof of value (POV), why is it important to deploy the Cortex XDR agent?



Answer : D

Deploying the Cortex XDR agent during a Cortex XSIAM proof of value (POV) is important because it provides telemetry for stitching and analytics. The agent collects endpoint data that is essential for detecting and correlating threats, enabling advanced analytics and providing the necessary context to improve incident response and decision-making in the security environment.


Question 5

In addition to incident volume, which four critical factors must be evaluated to determine effectiveness and ROI on cybersecurity planning and technology?



Answer : C

When evaluating the effectiveness and ROI on cybersecurity planning and technology, it's important to consider people, security controls, mean time to detect (MTTD), and false positives. These factors help ensure that the security infrastructure is both efficient and effective in preventing, detecting, and responding to threats, while optimizing the overall cost and resource allocation.


Question 6

An Administrator is alerted to a Suspicious Process Creation security event from multiple users.

The users believe that these events are false positives Which two steps should the administrator take to confirm the false positives and create an exception? (Choose two )



Answer : B, C


Question 7

Which service helps uncover attackers wherever they hide by combining world-class threat hunters with Cortex XDR technology that runs on integrated endpoint, network, and cloud data sources?



Answer : B


Page:    1 / 14   
Total 168 questions