Where can SHA256 hash values be used in Cortex XDR Malware Protection Profiles?
Which search methods is supported by File Search and Destroy?
When creating a custom XQL query in a dashboard, how would a user save that XQL query to the Widget Library?
Which of the following is NOT a precanned script provided by Palo Alto Networks?
As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to download Cobalt Strike on one of your servers. Days later, you learn about a massive ongoing supply chain attack. Using Cortex XDR you recognize that your server was compromised by the attack and that Cortex XDR prevented it. What steps can you take to ensure that the same protection is extended to all your servers?
How does Cortex XDR agent for Windows prevent ransomware attacks from compromising the file system?
Which of the following represents a common sequence of cyber-attack tactics?
In Cortex XDR management console scheduled reports can be forwarded to which of the following applications/services?
When reaching out to TAC for additional technical support related to a Security Event; what are two critical pieces of information you need to collect from the Agent? (Choose Two)
What types of actions you can execute with live terminal session?