Certbus > Palo Alto Networks > Palo Alto Networks Certifications > PCDRA > PCDRA Online Practice Questions and Answers

PCDRA Online Practice Questions and Answers

Questions 4

In the Cortex XDR console, from which two pages are you able to manually perform the agent upgrade action? (Choose two.)

A. Asset Management

B. Agent Installations

C. Action Center

D. Endpoint Administration

Browse 91 Q&As
Questions 5

What kind of malware uses encryption, data theft, denial of service, and possibly harassment to take advantage of a victim?

A. Ransomware

B. Worm

C. Keylogger

D. Rootkit

Browse 91 Q&As
Questions 6

Which of the following policy exceptions applies to the following description?

`An exception allowing specific PHP files'

A. Support exception

B. Local file threat examination exception

C. Behavioral threat protection rule exception

D. Process exception

Browse 91 Q&As
Questions 7

Which statement regarding scripts in Cortex XDR is true?

A. Any version of Python script can be run.

B. The level of risk is assigned to the script upon import.

C. Any script can be imported including Visual Basic (VB) scripts.

D. The script is run on the machine uploading the script to ensure that it is operational.

Browse 91 Q&As
Questions 8

A Linux endpoint with a Cortex XDR Pro per Endpoint license and Enhanced Endpoint Data enabled has reported malicious activity, resulting in the creation of a file that you wish to delete. Which action could you take to delete the file?

A. Manually remediate the problem on the endpoint in question.

B. Open X2go from the Cortex XDR console and delete the file via X2go.

C. Initiate Remediate Suggestions to automatically delete the file.

D. Open an NFS connection from the Cortex XDR console and delete the file.

Browse 91 Q&As
Questions 9

Which profiles can the user use to configure malware protection in the Cortex XDR console?

A. Malware Protection profile

B. Malware profile

C. Malware Detection profile

D. Anti-Malware profile

Browse 91 Q&As
Questions 10

What is the purpose of the Cortex Data Lake?

A. a local storage facility where your logs and alert data can be aggregated

B. a cloud-based storage facility where your firewall logs are stored

C. the interface between firewalls and the Cortex XDR agents

D. the workspace for your Cortex XDR agents to detonate potential malware files

Browse 91 Q&As
Questions 11

What is the maximum number of agents one Broker VM local agent applet can support?

A. 5,000

B. 10,000

C. 15,000

D. 20,000

Browse 91 Q&As
Questions 12

As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to download Cobalt Strike on one of your servers. Days later, you learn about a massive ongoing supply chain attack. Using Cortex XDR you recognize that your server was compromised by the attack and that Cortex XDR prevented it. What steps can you take to ensure that the same protection is extended to all your servers?

A. Create Behavioral Threat Protection (BTP) rules to recognize and prevent the activity.

B. Enable DLL Protection on all servers but there might be some false positives.

C. Create IOCs of the malicious files you have found to prevent their execution.

D. Enable Behavioral Threat Protection (BTP) with cytool to prevent the attack from spreading.

Browse 91 Q&As
Questions 13

Which of the following paths will successfully activate Remediation Suggestions?

A. Incident View > Actions > Remediation Suggestions

B. Causality View > Actions > Remediation Suggestions

C. Alerts Table > Right-click on a process node > Remediation Suggestions

D. Alerts Table > Right-click on an alert > Remediation Suggestions

Browse 91 Q&As
Questions 14

To stop a network-based attack, any interference with a portion of the attack pattern is enough to prevent it from succeeding. Which statement is correct regarding the Cortex XDR Analytics module?

A. It does not interfere with any portion of the pattern on the endpoint.

B. It interferes with the pattern as soon as it is observed by the firewall.

C. It does not need to interfere with the any portion of the pattern to prevent the attack.

D. It interferes with the pattern as soon as it is observed on the endpoint.

Browse 91 Q&As
Questions 15

You can star security events in which two ways? (Choose two.)

A. Create an alert-starring configuration.

B. Create an Incident-starring configuration.

C. Manually star an alert.

D. Manually star an Incident.

Browse 91 Q&As
Questions 16

Which Exploit Prevention Module (EPM) provides better entropy for randomization of memory locations?

A. Memory Limit Heap spray check

B. UASLR

C. JIT Mitigation

D. DLL Security

Browse 91 Q&As
Questions 17

The Cortex XDR console has triggered an incident, blocking a vitally important piece of software in your organization that is known to be benign. Which of the following options would prevent Cortex XDR from blocking this software in the future, for all endpoints in your organization?

A. Create an individual alert exclusion.

B. Create a global inclusion.

C. Create an endpoint-specific exception.

D. Create a global exception.

Browse 91 Q&As
Questions 18

What is the function of WildFire for Cortex XDR?

A. WildFire runs in the cloud and analyses alert data from the XDR agent to check for behavioural threats.

B. WildFire is the engine that runs on the local agent and determines whether behavioural threats are occurring on the endpoint.

C. WildFire accepts and analyses a sample to provide a verdict.

D. WildFire runs entirely on the agent to quickly analyse samples and provide a verdict.

Browse 91 Q&As
Exam Code: PCDRA
Exam Name: Palo Alto Networks Certified Detection and Remediation Analyst (PCDRA)
Last Update: Mar 14, 2025
Questions: 91 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99