What is by far the most common tactic used by ransomware to shut down a victim’s operation?
Answer : D
Cortex XDR Analytics can alert when detecting activity matching the following MITRE ATT&CKTM techniques.
Answer : D
When selecting multiple Incidents at a time, what options are available from the menu when a user right-clicks the incidents? (Choose two.)
Answer : AB
A file is identified as malware by the Local Analysis module whereas WildFire verdict is Benign, Assuming WildFire is accurate. Which statement is correct for the incident?
Answer : B
What is the outcome of creating and implementing an alert exclusion?
Answer : B
Which statement is true for Application Exploits and Kernel Exploits?
Answer : A
To create a BIOC rule with XQL query you must at a minimum filter on which field in order for it to be a valid BIOC rule?
Answer : D
Which of the following is an example of a successful exploit?
Answer : C
Which of the following represents the correct relation of alerts to incidents?
Answer : A
Which of the following protection modules is checked first in the Cortex XDR Windows agent malware protection flow?
Answer : B
While working the alerts involved in a Cortex XDR incident, an analyst has found that every alert in this incident requires an exclusion. What will the Cortex XDR console automatically do to this incident if all alerts contained have exclusions?
Answer : D
Network attacks follow predictable patterns. If you interfere with any portion of this pattern, the attack will be neutralized. Which of the following statements is correct?
Answer : A
After scan, how does file quarantine function work on an endpoint?
Answer : C
Which two types of exception profiles you can create in Cortex XDR? (Choose two.)
Answer : AC
Which profiles can the user use to configure malware protection in the Cortex XDR console?
Answer : B
Have any questions or issues ? Please dont hesitate to contact us