In the Cortex XDR console, from which two pages are you able to manually perform the agent upgrade action? (Choose two.)
A. Asset Management
B. Agent Installations
C. Action Center
D. Endpoint Administration
What kind of malware uses encryption, data theft, denial of service, and possibly harassment to take advantage of a victim?
A. Ransomware
B. Worm
C. Keylogger
D. Rootkit
Which of the following policy exceptions applies to the following description?
`An exception allowing specific PHP files'
A. Support exception
B. Local file threat examination exception
C. Behavioral threat protection rule exception
D. Process exception
Which statement regarding scripts in Cortex XDR is true?
A. Any version of Python script can be run.
B. The level of risk is assigned to the script upon import.
C. Any script can be imported including Visual Basic (VB) scripts.
D. The script is run on the machine uploading the script to ensure that it is operational.
A Linux endpoint with a Cortex XDR Pro per Endpoint license and Enhanced Endpoint Data enabled has reported malicious activity, resulting in the creation of a file that you wish to delete. Which action could you take to delete the file?
A. Manually remediate the problem on the endpoint in question.
B. Open X2go from the Cortex XDR console and delete the file via X2go.
C. Initiate Remediate Suggestions to automatically delete the file.
D. Open an NFS connection from the Cortex XDR console and delete the file.
Which profiles can the user use to configure malware protection in the Cortex XDR console?
A. Malware Protection profile
B. Malware profile
C. Malware Detection profile
D. Anti-Malware profile
What is the purpose of the Cortex Data Lake?
A. a local storage facility where your logs and alert data can be aggregated
B. a cloud-based storage facility where your firewall logs are stored
C. the interface between firewalls and the Cortex XDR agents
D. the workspace for your Cortex XDR agents to detonate potential malware files
What is the maximum number of agents one Broker VM local agent applet can support?
A. 5,000
B. 10,000
C. 15,000
D. 20,000
As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to download Cobalt Strike on one of your servers. Days later, you learn about a massive ongoing supply chain attack. Using Cortex XDR you recognize that your server was compromised by the attack and that Cortex XDR prevented it. What steps can you take to ensure that the same protection is extended to all your servers?
A. Create Behavioral Threat Protection (BTP) rules to recognize and prevent the activity.
B. Enable DLL Protection on all servers but there might be some false positives.
C. Create IOCs of the malicious files you have found to prevent their execution.
D. Enable Behavioral Threat Protection (BTP) with cytool to prevent the attack from spreading.
Which of the following paths will successfully activate Remediation Suggestions?
A. Incident View > Actions > Remediation Suggestions
B. Causality View > Actions > Remediation Suggestions
C. Alerts Table > Right-click on a process node > Remediation Suggestions
D. Alerts Table > Right-click on an alert > Remediation Suggestions
To stop a network-based attack, any interference with a portion of the attack pattern is enough to prevent it from succeeding. Which statement is correct regarding the Cortex XDR Analytics module?
A. It does not interfere with any portion of the pattern on the endpoint.
B. It interferes with the pattern as soon as it is observed by the firewall.
C. It does not need to interfere with the any portion of the pattern to prevent the attack.
D. It interferes with the pattern as soon as it is observed on the endpoint.
You can star security events in which two ways? (Choose two.)
A. Create an alert-starring configuration.
B. Create an Incident-starring configuration.
C. Manually star an alert.
D. Manually star an Incident.
Which Exploit Prevention Module (EPM) provides better entropy for randomization of memory locations?
A. Memory Limit Heap spray check
B. UASLR
C. JIT Mitigation
D. DLL Security
The Cortex XDR console has triggered an incident, blocking a vitally important piece of software in your organization that is known to be benign. Which of the following options would prevent Cortex XDR from blocking this software in the future, for all endpoints in your organization?
A. Create an individual alert exclusion.
B. Create a global inclusion.
C. Create an endpoint-specific exception.
D. Create a global exception.
What is the function of WildFire for Cortex XDR?
A. WildFire runs in the cloud and analyses alert data from the XDR agent to check for behavioural threats.
B. WildFire is the engine that runs on the local agent and determines whether behavioural threats are occurring on the endpoint.
C. WildFire accepts and analyses a sample to provide a verdict.
D. WildFire runs entirely on the agent to quickly analyse samples and provide a verdict.