Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dcdisc65

Page: 1 / 3
Total 27 questions
Exam Code: PCDRA                Update: Oct 15, 2025
Exam Name: Palo Alto Networks Certified Detection and Remediation Analyst

Paloalto Networks Palo Alto Networks Certified Detection and Remediation Analyst PCDRA Exam Dumps: Updated Questions & Answers (October 2025)

Question # 1

Which two types of exception profiles you can create in Cortex XDR? (Choose two.)

A.

exception profiles that apply to specific endpoints

B.

agent exception profiles that apply to specific endpoints

C.

global exception profiles that apply to all endpoints

D.

role-based profiles that apply to specific endpoints

Question # 2

What is the Wildfire analysis file size limit for Windows PE files?

A.

No Limit

B.

500MB

C.

100MB

D.

1GB

Question # 3

Where can SHA256 hash values be used in Cortex XDR Malware Protection Profiles?

A.

in the macOS Malware Protection Profile to indicate allowed signers

B.

in the Linux Malware Protection Profile to indicate allowed Java libraries

C.

SHA256 hashes cannot be used in Cortex XDR Malware Protection Profiles

D.

in the Windows Malware Protection Profile to indicate allowed executables

Question # 4

What license would be required for ingesting external logs from various vendors?

A.

Cortex XDR Pro per Endpoint

B.

Cortex XDR Vendor Agnostic Pro

C.

Cortex XDR Pro per TB

D.

Cortex XDR Cloud per Host

Question # 5

Which of the following represents a common sequence of cyber-attack tactics?

A.

Actions on the objective » Reconnaissance »Weaponization& Delivery » Exploitation » Installation » Command & Control

B.

Installation >> Reconnaissance »Weaponization& Delivery » Exploitation » Command & Control » Actions on the objective

C.

Reconnaissance »Weaponization& Delivery » Exploitation » Installation » Command & Control » Actions on the objective

D.

Reconnaissance >> Installation »Weaponization& Delivery » Exploitation » Command & Control » Actions on the objective

Question # 6

Under which conditions is Local Analysis evoked to evaluate a file before the file is allowed to run?

A.

The endpoint is disconnected or the verdict from WildFire is of a type benign.

B.

The endpoint is disconnected or the verdict from WildFire is of a type unknown.

C.

The endpoint is disconnected or the verdict from WildFire is of a type malware.

D.

The endpoint is disconnected or the verdict from WildFire is of a type grayware.

Question # 7

What are two purposes of “Respond to Malicious Causality Chains” in a Cortex XDR Windows Malware profile? (Choose two.)

A.

Automatically close the connections involved in malicious traffic.

B.

Automatically kill the processes involved in malicious activity.

C.

Automatically terminate the threads involved in malicious activity.

D.

Automatically block the IP addresses involved in malicious traffic.

Question # 8

What is the standard installation disk space recommended to install a Broker VM?

A.

1GB disk space

B.

2GB disk space

C.

512GB disk space

D.

256GB disk space

Question # 9

As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to open a malicious Word document. You learn from the WildFire report and AutoFocus that this document is known to have been used in Phishing campaigns since 2018. What steps can you take to ensure that the same document is not opened by other users in your organization protected by the Cortex XDR agent?

A.

Enable DLL Protection on all endpoints but there might be some false positives.

B.

Create Behavioral Threat Protection (BTP) rules to recognize and prevent the activity.

C.

No step is required because Cortex shares IOCs with our fellow Cyber Threat Alliance members.

D.

No step is required because the malicious document is already stopped.

Question # 10

Which of the following is an example of a successful exploit?

A.

connecting unknown media to an endpoint that copied malware due to Autorun.

B.

a user executing code which takes advantage of a vulnerability on a local service.

C.

identifying vulnerable services on a server.

D.

executing a process executable for well-known and signed software.

Page: 1 / 3
Total 27 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 15 Oct 2025