Test - Palo Alto Networks Accredited Systems Engineer (PSE) : Cortex Associate Accreditation Exam
Test - Palo Alto Networks Accredited Systems Engineer (PSE) : Cortex Associate Accreditation Exam
Test - Palo Alto Networks Accredited Systems Engineer (PSE): Cortex Associate Accreditation Exam
Test Questions
Question 1 of 25.
Which function displays an entire picture of an attack including its root cause or delivery point?
Question 2 of 25.
What is an advantage of the multi-method detection approach used by Cortex XDR over traditional antivirus approaches?
Question 3 of 25.
Question 4 of 25.
Question 5 of 25.
Question 6 of 25.
Which are two ways that WildFire works with Cortex XDR Prevent? (Choose two.)
WildFire analyzes the root cause of attacks so that Cortex XDR can stop the attack before malware takes hold.
WildFire converts unknown attacks to known attacks so Cortex XDR can block the attacks in the future.
WildFire blocks known attacks before they reach endpoints.
WildFire provides known threat information to Cortex XDR agents.
Question 7 of 25.
Which statement is true regarding Cortex XDR Prevent Execution Restrictions?
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=2d695ed1-6ed2-462c-a1b6-b2e4d7939749&evalLvl=5&redirect_url=%2fphnx%2fdriver.aspx%3froutename%3dSocial%2fUniversalProfile%2fTra… 2/8
31/5/2020 Realize Your Potential: paloaltonetworks
Question 8 of 25.
Which statement describes the malware protection flow in Cortex XDR Prevent?
Question 9 of 25.
Where can the entire history of group interactions involving an attack response be seen?
WildFire
AutoFocus
The Cortex XDR Incident page
The Cortex XSOAR War Room
Question 10 of 25.
When is an existing Cortex XDR customer a bad prospect for Cortex XSOAR?
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=2d695ed1-6ed2-462c-a1b6-b2e4d7939749&evalLvl=5&redirect_url=%2fphnx%2fdriver.aspx%3froutename%3dSocial%2fUniversalProfile%2fTra… 3/8
31/5/2020 Realize Your Potential: paloaltonetworks
Question 11 of 25.
Which option best describes the functionality of Cortex XDR Prevent for endpoints?
Orchestration
Remediation
Detection and response
Prevention
Question 12 of 25.
Question 13 of 25.
Which sensor captures forensic information about a security event that occurs on an endpoint?
Question 14 of 25.
What are two sources of alert enrichment for Cortex XSOAR? (Choose two.)
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=2d695ed1-6ed2-462c-a1b6-b2e4d7939749&evalLvl=5&redirect_url=%2fphnx%2fdriver.aspx%3froutename%3dSocial%2fUniversalProfile%2fTra… 4/8
31/5/2020 Realize Your Potential: paloaltonetworks
AutoFocus
SIEMs
Question 15 of 25.
What’s a subplaybook?
Question 16 of 25.
Which Cortex XSOAR functionality always is part of accessing external sources for alert enrichment?
War Room
Playbooks
Integrations
Incidents
Question 17 of 25.
It puts attack steps in context for security analysts, even when each step in itself may look innocent.
It is completely automatic and does not require security analysts for operation.
It provides prevention as well as detection and response.
It is quicker than that of any of its competitors.
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=2d695ed1-6ed2-462c-a1b6-b2e4d7939749&evalLvl=5&redirect_url=%2fphnx%2fdriver.aspx%3froutename%3dSocial%2fUniversalProfile%2fTra… 5/8
31/5/2020 Realize Your Potential: paloaltonetworks
Question 18 of 25.
Which two problems does a security operations team often encounter? (Choose two.)
Question 19 of 25.
Question 20 of 25.
What should a customer do that wants to keep a set of specific information for every event of a certain type?
Question 21 of 25.
Which two analysis methods does WildFire use to detect malware? (Choose two.)
executive restriction
static
dynamic
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=2d695ed1-6ed2-462c-a1b6-b2e4d7939749&evalLvl=5&redirect_url=%2fphnx%2fdriver.aspx%3froutename%3dSocial%2fUniversalProfile%2fTra… 6/8
31/5/2020 Realize Your Potential: paloaltonetworks
program slicing
Question 22 of 25.
Which action is required before a new integration can ingest a typed alert and automatically run a playbook for the resulting incident?
Question 23 of 25.
What are two sources of log data for Cortex XDR? (Choose two.)
Mobile devices
Agents on endpoints
AutoFocus
Next-generation firewalls
Question 24 of 25.
What should a customer do to obtain a Cortex XSOAR dashboard that caters to their needs and processes?
quickly design and build the dashboard they need within minutes
hire consultants who can build in 30 to 60 days the dashboard they need
change their processes to conform with the well-tested standard dashboard
choose among millions of dashboards provided OOTB
Question 25 of 25.
Whi h d t i id d b k tt k ti ?
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=2d695ed1-6ed2-462c-a1b6-b2e4d7939749&evalLvl=5&redirect_url=%2fphnx%2fdriver.aspx%3froutename%3dSocial%2fUniversalProfile%2fTra… 7/8
31/5/2020 Realize Your Potential: paloaltonetworks
Which advantage is provided by unknown attack prevention?
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=2d695ed1-6ed2-462c-a1b6-b2e4d7939749&evalLvl=5&redirect_url=%2fphnx%2fdriver.aspx%3froutename%3dSocial%2fUniversalProfile%2fTra… 8/8