Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

PCDRA Paloalto Networks Palo Alto Networks Certified Detection and Remediation Analyst Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Paloalto Networks PCDRA Palo Alto Networks Certified Detection and Remediation Analyst certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 2
Total 91 questions

Which type of IOC can you define in Cortex XDR?

A.

Destination IP Address

B.

Source IP Address

C.

Source port

D.

Destination IPAddress: Destination

What are two purposes of “Respond to Malicious Causality Chains” in a Cortex XDR Windows Malware profile? (Choose two.)

A.

Automatically close the connections involved in malicious traffic.

B.

Automatically kill the processes involved in malicious activity.

C.

Automatically terminate the threads involved in malicious activity.

D.

Automatically block the IP addresses involved in malicious traffic.

You can star security events in which two ways? (Choose two.)

A.

Create an alert-starring configuration.

B.

Create an Incident-starring configuration.

C.

Manually star an alert.

D.

Manually star an Incident.

Live Terminal uses which type of protocol to communicate with the agent on the endpoint?

A.

NetBIOS over TCP

B.

WebSocket

C.

UDP and a random port

D.

TCP, over port 80

While working the alerts involved in a Cortex XDR incident, an analyst has found that every alert in this incident requires an exclusion. What will the Cortex XDR console automatically do to this incident if all alerts contained have exclusions?

A.

mark the incident as Unresolved

B.

create a BIOC rule excluding this behavior

C.

create an exception to prevent future false positives

D.

mark the incident as Resolved – False Positive

To create a BIOC rule with XQL query you must at a minimum filter on which field in order for it to be a valid BIOC rule?

A.

causality_chain

B.

endpoint_name

C.

threat_event

D.

event_type

Which statement is true for Application Exploits and Kernel Exploits?

A.

The ultimate goal of any exploit is to reach the application.

B.

Kernel exploits are easier to prevent then application exploits.

C.

The ultimate goal of any exploit is to reach the kernel.

D.

Application exploits leverage kernel vulnerability.

Which two types of exception profiles you can create in Cortex XDR? (Choose two.)

A.

exception profiles that apply to specific endpoints

B.

agent exception profiles that apply to specific endpoints

C.

global exception profiles that apply to all endpoints

D.

role-based profiles that apply to specific endpoints

A file is identified as malware by the Local Analysis module whereas WildFire verdict is Benign, Assuming WildFire is accurate. Which statement is correct for the incident?

A.

It is true positive.

B.

It is false positive.

C.

It is a false negative.

D.

It is true negative.

What does the following output tell us?

A.

There is one low severity incident.

B.

Host shpapy_win10 had the most vulnerabilities.

C.

There is one informational severity alert.

D.

This is an actual output of the Top 10 hosts with the most malware.

To stop a network-based attack, any interference with a portion of the attack pattern is enough to prevent it from succeeding. Which statement is correct regarding the Cortex XDR Analytics module?

A.

It does not interfere with any portion of the pattern on the endpoint.

B.

It interferes with the pattern as soon as it is observed by the firewall.

C.

It does not need to interfere with the any portion of the pattern to prevent the attack.

D.

It interferes with the pattern as soon as it is observed on the endpoint.

When creating a BIOC rule, which XQL query can be used?

A.

dataset = xdr_data

| filter event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

B.

dataset = xdr_data

| filter event_type = PROCESS and

event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

C.

dataset = xdr_data

| filter action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

| fields action_process_image

D.

dataset = xdr_data

| filter event_behavior = true

event_sub_type = PROCESS_START and

action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"

What is the maximum number of agents one Broker VM local agent applet can support?

A.

5,000

B.

10,000

C.

15,000

D.

20,000

Where would you view the WildFire report in an incident?

A.

next to relevant Key Artifacts in the incidents details page

B.

under Response --> Action Center

C.

under the gear icon --> Agent Audit Logs

D.

on the HUB page at apps.paloaltonetworks.com

When selecting multiple Incidents at a time, what options are available from the menu when a user right-clicks the incidents? (Choose two.)

A.

Assign incidents to an analyst in bulk.

B.

Change the status of multiple incidents.

C.

Investigate several Incidents at once.

D.

Delete the selected Incidents.

When viewing the incident directly, what is the “assigned to” field value of a new Incident that was just reported to Cortex?

A.

Pending

B.

It is blank

C.

Unassigned

D.

New

If you have an isolated network that is prevented from connecting to the Cortex Data Lake, which type of Broker VM setup can you use to facilitate the communication?

A.

Broker VM Pathfinder

B.

Local Agent Proxy

C.

Local Agent Installer and Content Caching

D.

Broker VM Syslog Collector

What is the standard installation disk space recommended to install a Broker VM?

A.

1GB disk space

B.

2GB disk space

C.

512GB disk space

D.

256GB disk space

What is the action taken out by Managed Threat Hunting team for Zero Day Exploits?

A.

MTH researches for threats in the tenant and generates a report with the findings.

B.

MTH researches for threats in the logs and reports to engineering.

C.

MTH runs queries and investigative actions and no further action is taken.

D.

MTH pushes content updates to prevent against thezero-dayexploits.

What license would be required for ingesting external logs from various vendors?

A.

Cortex XDR Pro per Endpoint

B.

Cortex XDR Vendor Agnostic Pro

C.

Cortex XDR Pro per TB

D.

Cortex XDR Cloud per Host

Page: 1 / 2
Total 91 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved