Which task setting allows context output to a specific key?

Which task setting allows context output to a specific key? a. Extend context b. Task output c. Stop on errors d. tagsView AnswerAnswer: A

October 4, 2024 No Comments READ MORE +

What is the result of creating an exception from an exploit security event?

What is the result of creating an exception from an exploit security event? a. Triggered exploit protection module (EPM) for the host and process involved is disabled b. User is exempt from generating events for 24 hours c. Process from WildFire analysis is whitelisted d. Administrators are exempt from generating...

October 4, 2024 No Comments READ MORE +

Which integration allows data to be pushed from Cortex XSOAR into Splunk?

Which integration allows data to be pushed from Cortex XSOAR into Splunk? a. SplunkUpdate integration b. Demisto App for Splunk integration c. SplunkPY integration d. ArcSight ESM integrationView AnswerAnswer: C

October 3, 2024 No Comments READ MORE +

What is a benefit of user entity behavior analytics (UEBA) over security information and event management (SIEM)?

What is a benefit of user entity behavior analytics (UEBA) over security information and event management (SIEM)? a. UEBA can add trusted signers of Windows or Mac processes to a whitelist in the Endpoint Security Manager (ESM) Console b. UEBA establishes a secure connection in which endpoints can be routed,...

October 3, 2024 No Comments READ MORE +

Which integration allows data to be pushed from Cortex XSOAR into Splunk?

Which integration allows data to be pushed from Cortex XSOAR into Splunk? a. SplunkUpdate integration b. Demisto App for Splunk integration c. SplunkPY integration d. ArcSight ESM integrationView AnswerAnswer: C

October 2, 2024 No Comments READ MORE +

Which two items are stitched to the Cortex XDR causality chain? (Choose two.)

Which two items are stitched to the Cortex XDR causality chain? (Choose two.) a. registry set value b. firewall alerts c. security and information event management (SIEM) d. full uniform resource locator (URL)View AnswerAnswer: B.D

September 30, 2024 No Comments READ MORE +

What will allow Cortex XSOAR to accomplish this in the most efficient way?

A Cortex XSOAR customer wants to ingest from a single mailbox. The mailbox brings in reported phishing emails and email requests from human resources (HR) to onboard new users. The customer wants to run two separate workflows from this mailbox, one for phishing and one for onboarding. What will allow...

September 27, 2024 No Comments READ MORE +

How can Cortex XSOAR save time when a phishing incident occurs?

How can Cortex XSOAR save time when a phishing incident occurs? a. It can automatically identify every mailbox that received the phish and create corresponding cases for them b. It can automatically email staff to warn them about the phishing attack and show them a copy of the email c....

September 26, 2024 No Comments READ MORE +

Which step is required to prepare the virtual desktop infrastructure (VDI) golden image?

Which step is required to prepare the virtual desktop infrastructure (VDI) golden image? a. Run the VDI conversion tool b. Ensure the latest content updates are installed c. Set the memory dumps to manual setting d. Review any portable executable (PE) files WildFire determined to be maliciousView AnswerAnswer: D

September 25, 2024 No Comments READ MORE +

How can Cortex XSOAR save time when a phishing incident occurs?

How can Cortex XSOAR save time when a phishing incident occurs? a. It can automatically identify every mailbox that received the phish and create corresponding cases for them b. It can automatically email staff to warn them about the phishing attack and show them a copy of the email c....

September 24, 2024 No Comments READ MORE +