Leads4pass > Palo Alto Networks > Palo Alto Networks Certifications > PCDRA > PCDRA Online Practice Questions and Answers

PCDRA Online Practice Questions and Answers

Questions 4

In the Cortex XDR console, from which two pages are you able to manually perform the agent upgrade action? (Choose two.)

A. Asset Management

B. Agent Installations

C. Action Center

D. Endpoint Administration

Buy Now
Questions 5

Which statement is correct based on the report output below?

A. Host Inventory Data Collection is enabled.

B. 3,297 total incidents have been detected.

C. Forensic inventory data collection is enabled.

D. 133 agents have full disk encryption.

Buy Now
Questions 6

Which module provides the best visibility to view vulnerabilities?

A. Live Terminal module

B. Device Control Violations module

C. Host Insights module

D. Forensics module

Buy Now
Questions 7

Can you disable the ability to use the Live Terminal feature in Cortex XDR?

A. Yes, via the Cortex XDR console or with an installation switch.

B. No, a separate installer package without Live Terminal is required.

C. No, it is a required feature of the agent.

D. Yes, via Agent Settings Profile.

Buy Now
Questions 8

What does the following output tell us?

A. There is one low severity incident.

B. Host shpapy_win10 had the most vulnerabilities.

C. There is one informational severity alert.

D. This is an actual output of the Top 10 hosts with the most malware.

Buy Now
Questions 9

Which function describes the removal of a specific file from its location on a local or removable drive to a protected folder to prevent the file from being executed?

A. Search and destroy

B. Isolation

C. Quarantine

D. Flag for removal

Buy Now
Questions 10

When investigating security events, which feature in Cortex XDR is useful for reverting the changes on the endpoint?

A. Remediation Automation

B. Machine Remediation

C. Automatic Remediation

D. Remediation Suggestions

Buy Now
Questions 11

Where would you view the WildFire report in an incident?

A. next to relevant Key Artifacts in the incidents details page

B. under Response --> Action Center

C. under the gear icon --> Agent Audit Logs

D. on the HUB page at apps.paloaltonetworks.com

Buy Now
Questions 12

When using the "File Search and Destroy" feature, which of the following search hash type is supported?

A. SHA256 hash of the file

B. AES256 hash of the file

C. MD5 hash of the file

D. SHA1 hash of the file

Buy Now
Questions 13

As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to open a malicious Word document. You learn from the WildFire report and AutoFocus that this document is known to have been used in Phishing campaigns since 2018. What steps can you take to ensure that the same document is not opened by other users in your organization protected by the Cortex XDR agent?

A. Enable DLL Protection on all endpoints but there might be some false positives.

B. Create Behavioral Threat Protection (BTP) rules to recognize and prevent the activity.

C. No step is required because Cortex shares IOCs with our fellow Cyber Threat Alliance members.

D. No step is required because the malicious document is already stopped.

Buy Now
Exam Code: PCDRA
Exam Name: Palo Alto Networks Certified Detection and Remediation Analyst (PCDRA)
Last Update: Jan 13, 2025
Questions: 91
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99