Which task setting allows context output to a specific key?
Which task setting allows context output to a specific key? a. Extend context b. Task output c. Stop on errors d. tagsView AnswerAnswer: A
What is the result of creating an exception from an exploit security event?
What is the result of creating an exception from an exploit security event? a. Triggered exploit protection module (EPM) for the host and process involved is disabled b. User is exempt from generating events for 24 hours c. Process from WildFire analysis is whitelisted d. Administrators are exempt from generating...
Which integration allows data to be pushed from Cortex XSOAR into Splunk?
Which integration allows data to be pushed from Cortex XSOAR into Splunk? a. SplunkUpdate integration b. Demisto App for Splunk integration c. SplunkPY integration d. ArcSight ESM integrationView AnswerAnswer: C
What is a benefit of user entity behavior analytics (UEBA) over security information and event management (SIEM)?
What is a benefit of user entity behavior analytics (UEBA) over security information and event management (SIEM)? a. UEBA can add trusted signers of Windows or Mac processes to a whitelist in the Endpoint Security Manager (ESM) Console b. UEBA establishes a secure connection in which endpoints can be routed,...
Which integration allows data to be pushed from Cortex XSOAR into Splunk?
Which integration allows data to be pushed from Cortex XSOAR into Splunk? a. SplunkUpdate integration b. Demisto App for Splunk integration c. SplunkPY integration d. ArcSight ESM integrationView AnswerAnswer: C
Which two items are stitched to the Cortex XDR causality chain? (Choose two.)
Which two items are stitched to the Cortex XDR causality chain? (Choose two.) a. registry set value b. firewall alerts c. security and information event management (SIEM) d. full uniform resource locator (URL)View AnswerAnswer: B.D
What will allow Cortex XSOAR to accomplish this in the most efficient way?
A Cortex XSOAR customer wants to ingest from a single mailbox. The mailbox brings in reported phishing emails and email requests from human resources (HR) to onboard new users. The customer wants to run two separate workflows from this mailbox, one for phishing and one for onboarding. What will allow...
How can Cortex XSOAR save time when a phishing incident occurs?
How can Cortex XSOAR save time when a phishing incident occurs? a. It can automatically identify every mailbox that received the phish and create corresponding cases for them b. It can automatically email staff to warn them about the phishing attack and show them a copy of the email c....
Which step is required to prepare the virtual desktop infrastructure (VDI) golden image?
Which step is required to prepare the virtual desktop infrastructure (VDI) golden image? a. Run the VDI conversion tool b. Ensure the latest content updates are installed c. Set the memory dumps to manual setting d. Review any portable executable (PE) files WildFire determined to be maliciousView AnswerAnswer: D
How can Cortex XSOAR save time when a phishing incident occurs?
How can Cortex XSOAR save time when a phishing incident occurs? a. It can automatically identify every mailbox that received the phish and create corresponding cases for them b. It can automatically email staff to warn them about the phishing attack and show them a copy of the email c....