Which two types of exception profiles you can create in Cortex XDR? (Choose two.)
What is the Wildfire analysis file size limit for Windows PE files?
Where can SHA256 hash values be used in Cortex XDR Malware Protection Profiles?
What license would be required for ingesting external logs from various vendors?
Which of the following represents a common sequence of cyber-attack tactics?
Under which conditions is Local Analysis evoked to evaluate a file before the file is allowed to run?
What are two purposes of “Respond to Malicious Causality Chains” in a Cortex XDR Windows Malware profile? (Choose two.)
What is the standard installation disk space recommended to install a Broker VM?
As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to open a malicious Word document. You learn from the WildFire report and AutoFocus that this document is known to have been used in Phishing campaigns since 2018. What steps can you take to ensure that the same document is not opened by other users in your organization protected by the Cortex XDR agent?
Which of the following is an example of a successful exploit?