A Cortex XSIAM analyst in a SOC is reviewing an incident involving a workstation showing signs of a potential breach. The incident includes an alert from Cortex XDR Analytics Alert source "Remote service command execution from an uncommon source." As part of the incident handling process, the analyst must apply response actions to contain the threat effectively.
Which initial Cortex XDR agent response action should be taken to reduce attacker mobility on the network?
Answer : A
The correct answer is A -- Isolate Endpoint.
The most effective initial response to contain a breach and reduce attacker mobility is to isolate the endpoint. This action ensures that the compromised machine can no longer communicate with the network or external systems, effectively cutting off lateral movement and exfiltration by attackers, while still allowing controlled response operations.
'Isolate Endpoint is the primary response action used to immediately contain a threat by severing all network communication, thus limiting attacker movement during active incidents.'
Document Reference: EDU-270c-10-lab-guide_02.docx (1).pdf
Page: Page 40 (Incident Handling/SOC section)
A Cortex XSIAM analyst is investigating a security incident involving a workstation after having deployed a Cortex XDR agent for 45 days. The incident details include the Cortex XDR Analytics Alert "Uncommon remote scheduled task creation." Which response will mitigate the threat?
Answer : A
The correct answer is A -- Initiate the endpoint isolate action to contain the threat.
For incidents indicating possible remote compromise or unauthorized task creation, the most effective initial response is endpoint isolation. This cuts off the endpoint's network access, preventing lateral movement and limiting attacker activity until further investigation and remediation.
''The endpoint isolate action is the primary containment step in incidents involving suspected remote compromise, halting network communication to reduce further risk.''
Document Reference: XSIAM Analyst ILT Lab Guide.pdf
Page: Page 40 (Incident Handling/SOC section)
Which two actions can an analyst take to reduce the number of false positive alerts generated by a custom BIOC? (Choose two.)
Answer : C, D
The correct answers are C (Implement an alert exclusion rule) and D (Implement a BIOC rule exception).
Alert exclusion rule: Allows analysts to specify criteria under which certain alerts are excluded from being generated, reducing unnecessary noise.
BIOC rule exception: Enables the analyst to exempt specific cases or environments from triggering a BIOC, effectively minimizing false positives.
'False positives from BIOC rules can be minimized by implementing alert exclusion rules or setting BIOC rule exceptions for known benign activity.'
Document Reference: XSIAM Analyst ILT Lab Guide.pdf
Page: Page 58 (Alerting and Detection section)
What information is provided in the timeline view of Cortex XSIAM?
Answer : D
The correct answer is D -- Sequence of events, alerts, rules and other actions involved over the lifespan of an incident.
The timeline view in Cortex XSIAM provides a chronological sequence of all events, alerts, and actions that have occurred in relation to a specific incident, helping analysts understand the incident's progression from start to finish.
'The timeline view provides a detailed, chronological sequence of events, alerts, and actions for the lifespan of an incident.'
Document Reference: XSIAM Analyst ILT Lab Guide.pdf
Page: Page 32 (Incident Handling section)
===========
Which Cytool command will re-enable protection on an endpoint that has Cortex XDR agent protection paused?
Answer : A
The correct answer is A -- cytool security enable.
The command cytool security enable is used to re-enable Cortex XDR agent protection on an endpoint after it has been paused or disabled. This command restores all core security functions as per XDR agent configuration.
''Use the cytool security enable command to re-enable the Cortex XDR agent's protection if it has been paused on an endpoint.''
Document Reference: EDU-270c-10-lab-guide_02.docx (1).pdf
Page: Page 13 (Agent Deployment and Configuration section)
===========
During an investigation of an alert with a completed playbook, it is determined that no indicators exist from the email "indicator@test.com" in the Key Assets & Artifacts tab of the parent incident. Which command will determine if Cortex XSIAM has been configured to extract indicators as expected?
Answer : C
The correct answer is C, the !checkIndicatorExtraction text='indicator@test.com' command.
This command specifically verifies if Cortex XSIAM has been correctly configured to extract indicators from given text. It ensures that the text provided ('indicator@test.com') would indeed be recognized and extracted as an indicator under the current configuration of Cortex XSIAM.
Other provided commands do not directly verify the indicator extraction configuration:
Option A: IcreateNewIndicator manually creates an indicator; it does not validate extraction capability.
Option B: !extractIndicators attempts extraction immediately but does not verify existing configuration explicitly.
Option D: Iemailvalue command is generally for creating or querying email indicators, not verifying extraction configuration.
Therefore, the explicit functionality for checking if indicator extraction is configured correctly within Cortex XSIAM is precisely covered by !checkIndicatorExtraction.
Reference Extract from Official Document:
'Verify if Cortex XSIAM is correctly configured to extract indicators using the command !checkIndicatorExtraction text=<value>.'
This exact description confirms that option C is the correct answer to validate the configuration explicitly.
Which feature terminates a process during an investigation?
Answer : B
The correct answer is B -- Live Terminal.
In Cortex XSIAM, the Live Terminal feature allows analysts to initiate an interactive command-line session with an endpoint directly from the management console. During an investigation, analysts can use Live Terminal to issue commands---including those that terminate suspicious or malicious processes running on the endpoint.
'Live Terminal provides analysts with a direct command line on the endpoint, enabling actions such as process termination during investigations.'
Document Reference: XSIAM Analyst ILT Lab Guide.pdf
Exact Page: Page 15 (Endpoints section)