Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

When using the “File Search and Destroy” feature, which of the following search hash type is supported?

A.

SHA256 hash of the file

B.

AES256 hash of the file

C.

MD5 hash of the file

D.

SHA1 hash of the file

Full Access
Question # 5

A file is identified as malware by the Local Analysis module whereas WildFire verdict is Benign, Assuming WildFire is accurate. Which statement is correct for the incident?

A.

It is true positive.

B.

It is false positive.

C.

It is a false negative.

D.

It is true negative.

Full Access
Question # 6

In incident-related widgets, how would you filter the display to only show incidents that were “starred”?

A.

Create a custom XQL widget

B.

This is not currently supported

C.

Create a custom report and filter on starred incidents

D.

Click the starin the widget

Full Access
Question # 7

Which of the following is an example of a successful exploit?

A.

connecting unknown media to an endpoint that copied malware due to Autorun.

B.

a user executing code which takes advantage of a vulnerability on a local service.

C.

identifying vulnerable services on a server.

D.

executing a process executable for well-known and signed software.

Full Access
Question # 8

What is the outcome of creating and implementing an alert exclusion?

A.

The Cortex XDR agent will allow the process that was blocked to run on the endpoint.

B.

The Cortex XDR console will hide those alerts.

C.

The Cortex XDR agent will not create an alert for this event in the future.

D.

The Cortex XDR console will delete those alerts and block ingestion of them in the future.

Full Access
Question # 9

What are two purposes of “Respond to Malicious Causality Chains” in a Cortex XDR Windows Malware profile? (Choose two.)

A.

Automatically close the connections involved in malicious traffic.

B.

Automatically kill the processes involved in malicious activity.

C.

Automatically terminate the threads involved in malicious activity.

D.

Automaticallyblock the IP addresses involved in malicious traffic.

Full Access