Black Friday Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Paloalto Networks > Palo Alto Certifications and Accreditations > PCDRA

PCDRA Palo Alto Networks Certified Detection and Remediation Analyst Question and Answers

Question # 4

Where would you view the WildFire report in an incident?

A.

next to relevant Key Artifacts in the incidents details page

B.

under Response --> Action Center

C.

under the gear icon --> Agent Audit Logs

D.

on the HUB page at apps.paloaltonetworks.com

Full Access
Question # 5

Which statement best describes how Behavioral Threat Protection (BTP) works?

A.

BTP injects into known vulnerable processes to detect malicious activity.

B.

BTP runs on the Cortex XDR and distributes behavioral signatures to all agents.

C.

BTP matches EDR data with rules provided by Cortex XDR.

D.

BTP uses machine Learning to recognize malicious activity even if it is not known.

Full Access
Question # 6

Which two types of exception profiles you can create in Cortex XDR? (Choose two.)

A.

exception profiles that apply to specific endpoints

B.

agent exception profiles that apply to specific endpoints

C.

global exception profiles that apply to all endpoints

D.

role-based profiles that apply to specific endpoints

Full Access
Question # 7

LiveTerminal uses which type of protocol to communicate with the agent on the endpoint?

A.

NetBIOS over TCP

B.

WebSocket

C.

UDP and a random port

D.

TCP, over port 80

Full Access
Question # 8

A file is identified as malware by the Local Analysis module whereas WildFire verdict is Benign, Assuming WildFire is accurate. Which statement is correct for the incident?

A.

It is true positive.

B.

It is false positive.

C.

It is a false negative.

D.

It is true negative.

Full Access
Question # 9

After scan, how does file quarantine function work on an endpoint?

A.

Quarantine takes ownership of the files and folders and prevents execution through access control.

B.

Quarantine disables the network adapters and locks down access preventing any communications with the endpoint.

C.

Quarantine removes a specific file from its location on a local or removable drive to a protected folder and prevents it from being executed.

D.

Quarantine prevents an endpoint from communicating with anything besides the listed exceptions in the agent profile and Cortex XDR.

Full Access