Test - Palo Alto Networks Accredited Systems Engineer (PSE) : Cortex Associate Accreditation Exam
Test - Palo Alto Networks Accredited Systems Engineer (PSE) : Cortex Associate Accreditation Exam
Test - Palo Alto Networks Accredited Systems Engineer (PSE) : Cortex Associate Accreditation Exam
Test - Palo Alto Networks Accredited Systems Engineer (PSE): Cortex Associate Accreditation Exam
Test Questions
Question 1 of 25.
What are two sources of alert enrichment for Cortex XSOAR? (Choose two.)
AutoFocus
Cortex Data Lake
Cortex XSOAR dashboards
SIEMs
Question 2 of 25.
Question 3 of 25.
What should a customer do that wants to keep a set of specific information for every event of a certain type?
Question 4 of 25.
What is an advantage of the multi-method detection approach used by Cortex XDR over traditional antivirus approaches?
Question 5 of 25.
Which statement describes the malware protection flow in Cortex XDR Prevent?
Question 6 of 25.
In which two ways does Cortex XDR Prevent complement Palo Alto Networks perimeter protection? (Choose two.)
Cortex XDR can prevent malevolent process execution spawned by traffic the NGFW allows through.
Information about threats is uploaded into Cortex XDR agents from perimeter NGFWs.
Cortex XDR agents send signatures about threats directly to Palo Alto Networks firewalls.
Endpoints sometimes are operated by their users outside the corporate network perimeter.
Question 7 of 25.
Which statement is true regarding Cortex XDR Prevent Execution Restrictions?
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=2d695ed1-6ed2-462c-a1b6-b2e4d7939749&evalLvl=5&redirect_url=%2fphnx%2fdriver.aspx%3froutename%3dSocial%2fUniversalProfile%2fTra… 2/8
31/5/2020 Realize Your Potential: paloaltonetworks
Question 8 of 25.
Which action saves time during attack investigation?
Question 9 of 25.
Which function enables a customer to consistently use multiple competing products with similar functions?
Question 10 of 25.
Which function displays an entire picture of an attack including its root cause or delivery point?
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=2d695ed1-6ed2-462c-a1b6-b2e4d7939749&evalLvl=5&redirect_url=%2fphnx%2fdriver.aspx%3froutename%3dSocial%2fUniversalProfile%2fTra… 3/8
31/5/2020 Realize Your Potential: paloaltonetworks
Question 11 of 25.
What’s a subplaybook?
Question 12 of 25.
When is an existing Cortex XDR customer a bad prospect for Cortex XSOAR?
Question 13 of 25.
Question 14 of 25.
Which option best describes the functionality of Cortex XDR Prevent for endpoints?
Remediation
Detection and response
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=2d695ed1-6ed2-462c-a1b6-b2e4d7939749&evalLvl=5&redirect_url=%2fphnx%2fdriver.aspx%3froutename%3dSocial%2fUniversalProfile%2fTra… 4/8
31/5/2020 Realize Your Potential: paloaltonetworks
Prevention
Orchestration
Question 15 of 25.
Question 16 of 25.
Which two analysis methods does WildFire use to detect malware? (Choose two.)
executive restriction
static
program slicing
dynamic
Question 17 of 25.
Which sensor captures forensic information about a security event that occurs on an endpoint?
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=2d695ed1-6ed2-462c-a1b6-b2e4d7939749&evalLvl=5&redirect_url=%2fphnx%2fdriver.aspx%3froutename%3dSocial%2fUniversalProfile%2fTra… 5/8
31/5/2020 Realize Your Potential: paloaltonetworks
Question 18 of 25.
Which action is required before a new integration can ingest a typed alert and automatically run a playbook for the resulting incident?
Question 19 of 25.
It puts attack steps in context for security analysts, even when each step in itself may look innocent.
It is completely automatic and does not require security analysts for operation.
It is quicker than that of any of its competitors.
It provides prevention as well as detection and response.
Question 20 of 25.
Which Cortex product provides intelligence to inform alert and incident analysis?
Cortex XSOAR
Cortex XDR
Zingbox
AutoFocus
Question 21 of 25.
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=2d695ed1-6ed2-462c-a1b6-b2e4d7939749&evalLvl=5&redirect_url=%2fphnx%2fdriver.aspx%3froutename%3dSocial%2fUniversalProfile%2fTra… 6/8
31/5/2020 Realize Your Potential: paloaltonetworks
Question 22 of 25.
Question 23 of 25.
It learns about normal user and process behavior in an infrastructure so it can recognize anomalous behavior.
It learns about the processes used by a SOC to automate those processes.
It learns about all the attacks throughout the world so that it can recognize which attacks are present in an environment.
It learns about the processes used in a SOC to provide customized alerts to the right people in the SOC.
Question 24 of 25.
Where can the entire history of group interactions involving an attack response be seen?
Question 25 of 25.
Whi h t bl d it ti t ft t ? (Ch t )
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=2d695ed1-6ed2-462c-a1b6-b2e4d7939749&evalLvl=5&redirect_url=%2fphnx%2fdriver.aspx%3froutename%3dSocial%2fUniversalProfile%2fTra… 7/8
31/5/2020 Realize Your Potential: paloaltonetworks
Which two problems does a security operations team often encounter? (Choose two.)
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=2d695ed1-6ed2-462c-a1b6-b2e4d7939749&evalLvl=5&redirect_url=%2fphnx%2fdriver.aspx%3froutename%3dSocial%2fUniversalProfile%2fTra… 8/8