New Year Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 3
Total 27 questions
Exam Code: XDR-Analyst                Update: Dec 15, 2025
Exam Name: Palo Alto Networks XDR Analyst

Paloalto Networks Palo Alto Networks XDR Analyst XDR-Analyst Exam Dumps: Updated Questions & Answers (December 2025)

Question # 1

Where can SHA256 hash values be used in Cortex XDR Malware Protection Profiles?

A.

in the macOS Malware Protection Profile to indicate allowed signers

B.

in the Linux Malware Protection Profile to indicate allowed Java libraries

C.

SHA256 hashes cannot be used in Cortex XDR Malware Protection Profiles

D.

in the Windows Malware Protection Profile to indicate allowed executables

Question # 2

Which search methods is supported by File Search and Destroy?

A.

File Seek and Destroy

B.

File Search and Destroy

C.

File Seek and Repair

D.

File Search and Repair

Question # 3

When creating a custom XQL query in a dashboard, how would a user save that XQL query to the Widget Library?

A.

Click the three dots on the widget and then choose “Save” and this will link the query to the Widget Library.

B.

This isn’t supported, you have to exit the dashboard and go into the Widget Library first to create it.

C.

Click on “Save to Action Center” in the dashboard and you will be prompted to give the query a name and description.

D.

Click on “Save to Widget Library” in the dashboard and you will be prompted to give the query a name and description.

Question # 4

Which of the following is NOT a precanned script provided by Palo Alto Networks?

A.

delete_file

B.

quarantine_file

C.

process_kill_name

D.

list_directories

Question # 5

As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to download Cobalt Strike on one of your servers. Days later, you learn about a massive ongoing supply chain attack. Using Cortex XDR you recognize that your server was compromised by the attack and that Cortex XDR prevented it. What steps can you take to ensure that the same protection is extended to all your servers?

A.

Create Behavioral Threat Protection (BTP) rules to recognize and prevent the activity.

B.

Enable DLL Protection on all servers but there might be some false positives.

C.

Create IOCs of the malicious files you have found to prevent their execution.

D.

Enable Behavioral Threat Protection (BTP) with cytool to prevent the attack from spreading.

Question # 6

How does Cortex XDR agent for Windows prevent ransomware attacks from compromising the file system?

A.

by encrypting the disk first.

B.

by utilizing decoy Files.

C.

by retrieving the encryption key.

D.

by patching vulnerable applications.

Question # 7

Which of the following represents a common sequence of cyber-attack tactics?

A.

Actions on the objective » Reconnaissance » Weaponization & Delivery » Exploitation » Installation » Command & Control

B.

Installation >> Reconnaissance » Weaponization & Delivery » Exploitation » Command & Control » Actions on the objective

C.

Reconnaissance » Weaponization & Delivery » Exploitation » Installation » Command & Control » Actions on the objective

D.

Reconnaissance >> Installation » Weaponization & Delivery » Exploitation » Command & Control » Actions on the objective

Question # 8

In Cortex XDR management console scheduled reports can be forwarded to which of the following applications/services?

A.

Salesforce

B.

Jira

C.

Service Now

D.

Slack

Question # 9

When reaching out to TAC for additional technical support related to a Security Event; what are two critical pieces of information you need to collect from the Agent? (Choose Two)

A.

The agent technical support file.

B.

The prevention archive from the alert.

C.

The distribution id of the agent.

D.

A list of all the current exceptions applied to the agent.

E.

The unique agent id.

Question # 10

What types of actions you can execute with live terminal session?

A.

Manage Network configurations, Quarantine Files, Run PowerShell scripts

B.

Manage Processes, Manage Files, Run Operating System Commands, Run Ruby Commands and Scripts

C.

Apply patches, Reboot System, send notification for end user, Run Python Commands and Scripts

D.

Manage Processes, Manage Files, Run Operating System Commands, Run Python Commands and Scripts

Page: 1 / 3
Total 27 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 15 Dec 2025