Paloalto Networks PCDRA Palo Alto Networks Certified Detection and Remediation Analyst Online Training
Paloalto Networks PCDRA Online Training
The questions for PCDRA were last updated at Nov 23,2024.
- Exam Code: PCDRA
- Exam Name: Palo Alto Networks Certified Detection and Remediation Analyst
- Certification Provider: Paloalto Networks
- Latest update: Nov 23,2024
Where can SHA256 hash values be used in Cortex XDR Malware Protection Profiles?
- A . in the macOS Malware Protection Profile to indicate allowed signers
- B . in the Linux Malware Protection Profile to indicate allowed Java libraries
- C . SHA256 hashes cannot be used in Cortex XDR Malware Protection Profiles
- D . in the Windows Malware Protection Profile to indicate allowed executables
How does Cortex XDR agent for Windows prevent ransomware attacks from compromising the file system?
- A . by encrypting the disk first.
- B . by utilizing decoy Files.
- C . by retrieving the encryption key.
- D . by patching vulnerable applications.
What functionality of the Broker VM would you use to ingest third-party firewall logs to the Cortex Data Lake?
- A . Netflow Collector
- B . Syslog Collector
- C . DB Collector
- D . Pathfinder
In the deployment of which Broker VM applet are you required to install a strong cipher SHA256-based SSL certificate?
- A . Agent Proxy
- B . Agent Installer and Content Caching
- C . Syslog Collector
- D . CSV Collector
When is the wss (WebSocket Secure) protocol used?
- A . when the Cortex XDR agent downloads new security content
- B . when the Cortex XDR agent uploads alert data
- C . when the Cortex XDR agent connects to WildFire to upload files for analysis
- D . when the Cortex XDR agent establishes a bidirectional communication channel
With a Cortex XDR Prevent license, which objects are considered to be sensors?
- A . Syslog servers
- B . Third-Party security devices
- C . Cortex XDR agents
- D . Palo Alto Networks Next-Generation Firewalls
Which license is required when deploying Cortex XDR agent on Kubernetes Clusters as a DaemonSet?
- A . Cortex XDR Pro per TB
- B . Host Insights
- C . Cortex XDR Pro per Endpoint
- D . Cortex XDR Cloud per Host
What kind of the threat typically encrypts user files?
- A . ransomware
- B . SQL injection attacks
- C . Zero-day exploits
- D . supply-chain attacks
When using the āFile Search and Destroyā feature, which of the following search hash type is supported?
- A . SHA256 hash of the file
- B . AES256 hash of the file
- C . MD5 hash of the file
- D . SHA1 hash of the file
If you have an isolated network that is prevented from connecting to the Cortex Data Lake, which type of Broker VM setup can you use to facilitate the communication?
- A . Broker VM Pathfinder
- B . Local Agent Proxy
- C . Local Agent Installer and Content Caching
- D . Broker VM Syslog Collector