PCDRA Exam - 20240324
PCDRA Exam - 20240324
PCDRA Exam - 20240324
Topic 1 - Exam A
Question #1 Topic 1
C. Reconnaissance, Persistence
Correct Answer: D
Selected Answer: D
D, Correct
upvoted 1 times
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 1/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
Question #2 Topic 1
A. dataset = xdr_data
action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"
B. dataset = xdr_data
action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"
C. dataset = xdr_data
| fields action_process_image
D. dataset = xdr_data
action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"
Correct Answer: B
Selected Answer: B
"The XQL query must at a minimum filter on the event_type field in order for it to be a valid BIOC rule."
upvoted 1 times
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 2/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
Question #3 Topic 1
Which built-in dashboard would be the best option for an executive, if they were looking for the Mean Time to Resolution (MTTR) metric?
Correct Answer: A
Selected Answer: C
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 3/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
Question #4 Topic 1
What are two purposes of “Respond to Malicious Causality Chains” in a Cortex XDR Windows Malware profile? (Choose two.)
Correct Answer: AD
I say it's A and D because of what I'm just reading off the official course in the section "Respond to Malicious Causality Chains". It goes like this:
"When the Cortex XDR agent detects a malicious activity, the Respond to Malicious Causality Chains module inspects the network connections
opened by the processes involved in the attack to identify malicious IP addresses."
To me that's A nd D not A and C.
upvoted 2 times
Selected Answer: AD
When the Cortex XDR agent identifies a remote network connection that attempts to perform malicious activity—such as encrypting endpoint files
—the agent can automatically block the IP address to close all existing communication and block new connections from this IP address to the
endpoint. When Cortex XDRblocks an IP address per endpoint, that address remains blocked throughout all agent profiles and policies, including
any host-firewall policy rules. You can view the list of all blocked IP addresses per endpoint from the Action Center, as well as unblock them to re-
enable communication as appropriate.
upvoted 3 times
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 4/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
Question #5 Topic 1
When creating a custom XQL query in a dashboard, how would a user save that XQL query to the Widget Library?
A. Click the three dots on the widget and then choose “Save” and this will link the query to the Widget Library.
B. This isn’t supported, you have to exit the dashboard and go into the Widget Library first to create it.
C. Click on “Save to Action Center” in the dashboard and you will be prompted to give the query a name and description.
D. Click on “Save to Widget Library” in the dashboard and you will be prompted to give the query a name and description.
Correct Answer: D
Selected Answer: D
Select
Save to Widget Library
to pivot to the Widget Library and generate a custom widget based on the query results. from admin guide pg. 212
upvoted 1 times
Question #6 Topic 1
What license would be required for ingesting external logs from various vendors?
Correct Answer: C
Selected Answer: C
LICENSE TYPE:
Ingesting Logs and Data from external sources requires a Cortex XDR Pro per GB license.
To receive Syslog data from an external source, you must fi rst set up the Syslog Collector applet on a Broker VM within your network.
upvoted 1 times
They have now changed the name of the license to "Pro per GB license" instead of TB.
upvoted 2 times
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 5/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
Question #7 Topic 1
An attacker tries to load dynamic libraries on macOS from an unsecure location. Which Cortex XDR module can prevent this attack?
A. DDL Security
D. Dylib Hijacking
Correct Answer: D
Selected Answer: D
Selected Answer: D
Dylib Hijacking
Prevents Dylib-hijacking attacks where the attacker attempts to load dynamic libraries on Mac operating systems from unsecured locations to gain
control of a process.
https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Prevent-Administrator-Guide/Endpoint-Protection-Modules
upvoted 3 times
Question #8 Topic 1
B. Unit 42 is responsible for the configuration optimization of the Cortex XDR server
C. Unit 42 is responsible for threat research, malware analysis and threat hunting
Correct Answer: C
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 6/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
Question #9 Topic 1
A. destination port
B. e-mail address
C. full path
D. App-ID
Correct Answer: C
Selected Answer: C
ii. TYPE indicates the type of indicators, such as Full Path, File Name, Domain, and Hash.
upvoted 1 times
Selected Answer: C
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 7/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
When viewing the incident directly, what is the “assigned to” field value of a new Incident that was just reported to Cortex?
A. Pending
B. It is blank
C. Unassigned
D. New
Correct Answer: D
from Admin Guide: Assigned To: The user to which the incident is assigned. The assignee tracks which analyst is responsible for investigating the
threat. Incidents that have not been assigned have a status of Unassigned. https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-
Pro-Administrator-Guide/Incidents
upvoted 5 times
Selected Answer: C
Selected Answer: C
Unassigned
upvoted 1 times
Selected Answer: C
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 8/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
In incident-related widgets, how would you filter the display to only show incidents that were “starred”?
Correct Answer: D
Selected Answer: D
Selected Answer: D
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 9/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
Correct Answer: B
Selected Answer: A
I vote A
upvoted 6 times
It is definitely A
upvoted 5 times
"The WildFire verdict displays next to relevant Key Artifacts in the incidents details page, the causality view, and within the Live Terminal view of
processes."
Selected Answer: A
that,s ok.
upvoted 1 times
upvoted 4 times
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 11/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
D. This is an actual output of the Top 10 hosts with the most malware.
Correct Answer: D
Selected Answer: A
Answer should be A. The blue color codes for low severity incidents.
upvoted 7 times
answer is A.
upvoted 1 times
Selected Answer: A
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 12/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
Answer should be A. The blue color codes for low severity incidents.
upvoted 2 times
Which engine, of the following, in Cortex XDR determines the most relevant artifacts in each alert and aggregates all alerts related to an event into
an incident?
A. Sensor Engine
Correct Answer: B
Selected Answer: B
pg . 12
upvoted 1 times
Selected Answer: B
From CXPAD:
The Causality Analysis Engine determines the most relevant artifacts in each alert and aggregates all alerts related to an event into an incident.
upvoted 4 times
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 13/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
A. Threat Actor
B. Discovery
C. Network
D. Dropper
Correct Answer: D
Selected Answer: D
Dropper
upvoted 1 times
Collection
Credential Access
Dropper
Evasion
Execution
Evasive
Exfiltration
File Privilege Manipulation
File Type Obfuscation
Infiltration
Lateral Movement
Other
Persistence
Privilege Escalation
Reconnaissance
Tampering
upvoted 3 times
Selected Answer: D
Selected Answer: B
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 14/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
upvoted 1 times
In Windows and macOS you need to prevent the Cortex XDR Agent from blocking execution of a file based on the digital signer. What is one way to
A. In the Restrictions Profile, add the file name and path to the Executable Files allow list.
B. Create a new rule exception and use the singer as the characteristic.
D. Add the signer to the allow list under the action center page.
Correct Answer: C
Selected Answer: C
By adding the digital signer to the allow list in the malware profile, you are essentially telling the Cortex XDR Agent to trust files signed by that
specific signer and allow their execution without being blocked.
It's worth noting that cybersecurity measures and software configurations can change over time, so it's essential to refer to the official
documentation or the latest guidelines provided by the product's vendor for the most up-to-date information. Additionally, configuring security
software requires careful consideration and should be performed by knowledgeable and authorized personnel to ensure the system's security.
upvoted 2 times
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 15/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to download Cobalt Strike on
one of your servers. Days later, you learn about a massive ongoing supply chain attack. Using Cortex XDR you recognize that your server was
compromised by the attack and that Cortex XDR prevented it. What steps can you take to ensure that the same protection is extended to all your
servers?
A. Create Behavioral Threat Protection (BTP) rules to recognize and prevent the activity.
B. Enable DLL Protection on all servers but there might be some false positives.
C. Create IOCs of the malicious files you have found to prevent their execution.
D. Enable Behavioral Threat Protection (BTP) with cytool to prevent the attack from spreading.
Correct Answer: A
[1]: https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Create-a-BIOC-Rule
[2]: https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/about-behavioral-threat-protection-btp-rules/td-p/395977
upvoted 2 times
C can also not be correct since IOCs lead to detections, and do not prevent the file from running.
My guess would be B
upvoted 2 times
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 16/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which statement is true based on the following Agent Auto Upgrade widget?
Correct Answer: B
Selected Answer: B
admin guide pg. 287 and 128 clients are not configured according to this graph
upvoted 1 times
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 17/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
Correct Answer: B
Selected Answer: A
It's to mimic the trusted software/hardware and get into networks. Answer A
upvoted 1 times
Correct answer: A
upvoted 1 times
Selected Answer: A
Agree to A
upvoted 4 times
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 18/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
What is the standard installation disk space recommended to install a Broker VM?
Correct Answer: C
Selected Answer: C
Hardware: For standard installation, use a minimum of a 4-core processor, 8GB RAM, and 512GB disk. If you only intend to use the broker VM for
agent proxy, you can use a 2-core processor. If you intend to use the broker VM for agent installer and content caching, you must use an 8-core
processor.
upvoted 3 times
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 19/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
Where can SHA256 hash values be used in Cortex XDR Malware Protection Profiles?
Correct Answer: D
Allow list has been moved from Prevention Profiles to Exceptions Configuration
upvoted 2 times
How does Cortex XDR agent for Windows prevent ransomware attacks from compromising the file system?
Correct Answer: B
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 20/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
What functionality of the Broker VM would you use to ingest third-party firewall logs to the Cortex Data Lake?
A. Netflow Collector
B. Syslog Collector
C. DB Collector
D. Pathfinder
Correct Answer: B
Selected Answer: B
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 21/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
In the deployment of which Broker VM applet are you required to install a strong cipher SHA256-based SSL certificate?
A. Agent Proxy
C. Syslog Collector
D. CSV Collector
Correct Answer: B
Agent Installer and Content Caching: Requires you upload a strong cipher SHA256-based SSL certificates when you setup the Broker VM.
upvoted 2 times
C. when the Cortex XDR agent connects to WildFire to upload files for analysis
Correct Answer: D
From beacon:
WebSocket is a stateful, full-duplex communication protocol that allows a two-way interactive communication between a Cortex XDR instance and
Cortex XDR agents. This type of communication allows data transfers in real-time by keeping sessions for a longer durations. When you perform
one of these critical response actions from the Cortex XDR management console, the Cortex XDR instance establishes a session between the
instance itself and the targeted endpoint. Then, the session is kept alive even after the response action is complete. Live Terminal is among these
response actions.
upvoted 2 times
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 22/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
With a Cortex XDR Prevent license, which objects are considered to be sensors?
A. Syslog servers
Correct Answer: C
Syslog Collector is not included in XDR Prevent, only Pro Pr. TB.
Pro Pr. TB is also required for External vendors, meaning Third Party security devices.
Prevent does not include a firewall, leaving only C since
"Cortex XDR uses your existing Palo Alto Networks products as sensors to collect logs and telemetry data."
upvoted 1 times
Which license is required when deploying Cortex XDR agent on Kubernetes Clusters as a DaemonSet?
B. Host Insights
Correct Answer: D
admin pg 16
upvoted 1 times
CXPAD:
"To protect a Kubernetes or similar container orchestrator endpoint, Cortex XDR requires a Cortex Cloud per Host license."
upvoted 4 times
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 23/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
A. ransomware
C. Zero-day exploits
D. supply-chain attacks
Correct Answer: A
Selected Answer: A
When using the “File Search and Destroy” feature, which of the following search hash type is supported?
Correct Answer: A
Selected Answer: A
https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Search-and-Destroy-Malicious-Files
To search by hash, enter the file SHA256 value. When you search by hash, you can also search for deleted instances of this file on the endpoint.
upvoted 1 times
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 24/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
If you have an isolated network that is prevented from connecting to the Cortex Data Lake, which type of Broker VM setup can you use to facilitate
the communication?
A. Broker VM Pathfinder
Correct Answer: C
B. Cortex XDR in restricted networks where endpoints do not have a direct connection to the internet, setup the Broker VM to act as a proxy
upvoted 5 times
Selected Answer: B
I agree it is B
upvoted 1 times
Caching just means it will cache the data, but if it doesn't have the data it will try to go get it. This won't work in an isolated network so C isn't
correct.
upvoted 2 times
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 25/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
What is by far the most common tactic used by ransomware to shut down a victim’s operation?
A. preventing the victim from being able to access APIs to cripple infrastructure
Correct Answer: D
Selected Answer: D
I didn't find it the guide but I think it is common knowledge that ransomware does this action
upvoted 1 times
Selected Answer: D
D is correct.
upvoted 1 times
Cortex XDR Analytics can alert when detecting activity matching the following MITRE ATT&CKTM techniques.
Correct Answer: D
it does list those three but in the picture next to it in the guide, it shows impact as well but does not describe it.
upvoted 1 times
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 26/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
When selecting multiple Incidents at a time, what options are available from the menu when a user right-clicks the incidents? (Choose two.)
Correct Answer: AB
Selected Answer: AB
I agree it is AB
upvoted 1 times
Selected Answer: AB
A, B
https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Incidents
Check box to select one or more incidents on which to perform the following actions.
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 27/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
A file is identified as malware by the Local Analysis module whereas WildFire verdict is Benign, Assuming WildFire is accurate. Which statement is
A. It is true positive.
B. It is false positive.
C. It is a false negative.
D. It is true negative.
Correct Answer: B
Selected Answer: B
the follow up question is what to do about this. I think you would put an exception to the policy, not touch wildfire.
upvoted 1 times
A. The Cortex XDR agent will allow the process that was blocked to run on the endpoint.
C. The Cortex XDR agent will not create an alert for this event in the future.
D. The Cortex XDR console will delete those alerts and block ingestion of them in the future.
Correct Answer: B
"Alert Exclusion rules specify match criteria for alerts that you want to suppress."
upvoted 1 times
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 28/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
Correct Answer: A
Selected Answer: A
I think it is A, only because the other answers feel wrong but I can't find definite reason why A is right
upvoted 1 times
Selected Answer: C
The attacker's ultimate goal is to reach the kernel because if he reaches the kernel, he can do anything he wants and to execute something he will
not need privileged access. There are many mitigation techniques with Application Exploits but not many for the kernel.
upvoted 1 times
Selected Answer: A
I vote A because exploit does NOT nead to reach the kernel. So not C. Kernel exploits are really hard to defend against as it's the very root of the
OS. So not B. Definitively not D. So remains an A.
So how can I explain that it is A? I would say with this circle that Palo Alto commonly spreads on the internet:
https://www.paloaltonetworks.co.uk/research/apac-ondemand-webinar-2016-how-to-complete-the-security-puzzle-with-wildfire-and-traps
Usually they say if we can interrupt one part of the exploit the chain will be broken. So in the center we got the application of an exploit permitted.
Hence why I vote A. Ultimate goal of an exploit is to reach application.
upvoted 2 times
“The goal with exploit chain attacks is to gain kernel/root/system level access to compromise a system in order to execute an attack,”
he answer is C
upvoted 1 times
Selected Answer: A
C should be right.
upvoted 3 times
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 29/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
To create a BIOC rule with XQL query you must at a minimum filter on which field in order for it to be a valid BIOC rule?
A. causality_chain
B. endpoint_name
C. threat_event
D. event_type
Correct Answer: D
Selected Answer: D
https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Create-a-BIOC-Rule
upvoted 1 times
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 30/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
Correct Answer: C
Selected Answer: B
b seems like best answer but A is not a good thing either, A at least did not get executed, only uploaded.
upvoted 1 times
Selected Answer: B
From documentation :
"An exploit is a piece of code or a program that takes advantage of a weakness (aka vulnerability) in an application or system."
https://www.paloaltonetworks.com/cyberpedia/malware-vs-exploits
upvoted 2 times
executing a code that take advantage of a vulnerability (does not mean it will be successful)
but able to identify vulnerabilities in a SERVER (mean that a bad actor manages to get past security)
upvoted 1 times
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 31/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
A. Only alerts with the same host are grouped together into one Incident in a given time frame.
B. Alerts that occur within a three hour time frame are grouped together into one Incident.
C. Alerts with same causality chains that occur within a given time frame are grouped together into an Incident.
Correct Answer: A
Selected Answer: C
Alerts on the same causality chain are grouped with the same incident if an open incident already exists. Otherwise, the new incoming alert will
create a new incident.
https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Prevent-Administrator-Guide/Investigate-Incidents
upvoted 5 times
Selected Answer: C
I vote C
upvoted 1 times
I vote C
upvoted 2 times
Selected Answer: C
I vote C
upvoted 1 times
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 32/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which of the following protection modules is checked first in the Cortex XDR Windows agent malware protection flow?
C. Restriction Policy
Correct Answer: B
Selected Answer: D
https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Prevent-Administrator-Guide/File-Analysis-and-Protection-Flow
If the process tries to launch any child processes, the Cortex XDR agent first evaluates the child process protection policy. If the parent process is a
known targeted process that attempts to launch a restricted child process, the Cortex XDR agent blocks the child processes from running and
reports the security event to Cortex XDR.
upvoted 1 times
Selected Answer: D
Selected Answer: D
https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Prevent-Administrator-Guide/File-Analysis-and-Protection-Flow
upvoted 3 times
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 33/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
While working the alerts involved in a Cortex XDR incident, an analyst has found that every alert in this incident requires an exclusion. What will
the Cortex XDR console automatically do to this incident if all alerts contained have exclusions?
Correct Answer: D
Selected Answer: D
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 34/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
Network attacks follow predictable patterns. If you interfere with any portion of this pattern, the attack will be neutralized. Which of the following
statements is correct?
A. Cortex XDR Analytics allows to interfere with the pattern as soon as it is observed on the firewall.
B. Cortex XDR Analytics does not interfere with the pattern as soon as it is observed on the endpoint.
C. Cortex XDR Analytics does not have to interfere with the pattern as soon as it is observed on the endpoint in order to prevent the attack.
D. Cortex XDR Analytics allows to interfere with the pattern as soon as it is observed on the endpoint.
Correct Answer: A
Therefore, for this question on ExamTopics I'd say the answer is B as well.
upvoted 5 times
Selected Answer: B
The Cortex XDR Analytics Engine retrieves logs from the Cortex XDR tenant to create a baseline so that it can raise alerts when abnormal activity
occurs. This analysis is highly sophisticated and performed on more than a thousand dimensions of data. Internally, Cortex XDR organizes its
analytics activity into algorithms called detectors. Each detector is responsible for raising an alert when suspicious behavior is detected.
https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Analytics-Concepts
So I vote B. It enables the possibility but not to do anything on the Firewall itself or Endpoint itself. So it cannot act as soon as pattern is detected.
upvoted 2 times
Selected Answer: D
The Cortex XDR Analytics Engine retrieves logs from the Cortex XDR tenant to create a baseline so that it can raise alerts when abnormal activity
occurs. This analysis is highly sophisticated and performed on more than a thousand dimensions of data. Internally, Cortex XDR organizes its
analytics activity into algorithms called detectors. Each detector is responsible for raising an alert when suspicious behavior is detected.
https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Analytics-Concepts
So I vote D. It enables the possibility but not to do anything on the Firewall itself.
upvoted 2 times
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 35/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
My answer would be B.
upvoted 2 times
https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Analytics-Concepts
The Cortex XDR app uses its Analytics Engine to examine logs and data retrieved from your sensors on the Cortex XDR tenants to build an activity
baseline, and recognize abnormal activity when it occurs. The Analytics Engine accesses your logs as they are streamed to the Cortex XDR tenant,
including any Firewall data, and analyzes the data as soon as it arrives. Cortex XDR raises an Analytics alert when the Analytics Engine determines
an anomaly.
https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Analytics-Concepts
upvoted 1 times
A. Quarantine takes ownership of the files and folders and prevents execution through access control.
B. Quarantine disables the network adapters and locks down access preventing any communications with the endpoint.
C. Quarantine removes a specific file from its location on a local or removable drive to a protected folder and prevents it from being executed.
D. Quarantine prevents an endpoint from communicating with anything besides the listed exceptions in the agent profile and Cortex XDR.
Correct Answer: C
Selected Answer: C
"it moves the file from the location on a local or removable drive to a local quarantine folder (%PROGRAMDATA%\Cyvera\Quarantine) where it
isolates the file." in admin guide link
upvoted 1 times
Selected Answer: C
c. thas rigth
upvoted 1 times
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 36/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which two types of exception profiles you can create in Cortex XDR? (Choose two.)
Correct Answer: AC
Selected Answer: AC
Which profiles can the user use to configure malware protection in the Cortex XDR console?
B. Malware profile
D. Anti-Malware profile
Correct Answer: B
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 37/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
D. Forensics module
Correct Answer: C
Selected Answer: C
Selected Answer: C
https://www.boll.ch/datasheets/Cortex_XDR_Host_Insights.pdf
upvoted 1 times
Which of the following is NOT a precanned script provided by Palo Alto Networks?
A. delete_file
B. quarantine_file
C. process_kill_name
D. list_directories
Correct Answer: B
Selected Answer: B
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 38/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
Live Terminal uses which type of protocol to communicate with the agent on the endpoint?
B. WebSocket
Correct Answer: B
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 39/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
You can star security events in which two ways? (Choose two.)
Correct Answer: BD
Selected Answer: BD
https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Prevent-Administrator-Guide/Manage-Incident-Starring
You can manually star an incident after reviewing it, or you can create an incident starring configuration that automatically categorizes and stars
incidents when a related alert contains the specific attributes that you decide are important.
upvoted 1 times
https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Prevent-Administrator-Guide/Manage-Incident-Starring
upvoted 1 times
Selected Answer: AD
can manually star incident and using Starred Alerts rule under Incident Configuration
upvoted 1 times
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 40/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
Where would you go to add an exception to exclude a specific file hash from examination by the Malware profile for a Windows endpoint?
A. Find the Malware profile attached to the endpoint, Under Portable Executable and DLL Examination add the hash to the allow list.
B. From the rules menu select new exception, fill out the criteria, choose the scope to apply it to, hit save.
C. Find the exceptions profile attached to the endpoint, under process exceptions select local analysis, paste the hash and save.
D. In the Action Center, choose Allow list, select new action, select add to allow list, add your hash to the list, and apply it.
Correct Answer: B
"If you want to create a rule to take action on specific behaviors but also want to exclude one or more indicators from the rule, you can create an
IOC or BIOC rule exception. An indicator can include the SHA256 hash of a process, process name, process path, vendor name, user name, causality
group owner (CGO) full path, or process command-line arguments. For more information about these indicators, see Rules. For each exception, you
also specify the rule scope to which the exception applies."
"Select Settings → Exception Configuration → IOC/BIOC Suppression Rules.
Click + New Exception.
Specify a Rule Name and an optional Description.
etc."
upvoted 3 times
Selected Answer: D
Hash exception - A hash exception enables you to override the verdict for a specific file
without affecting the settings in your Malware Security profile. The Hash Exception policy is
evaluated first and takes precedence over all other methods to determine the hash verdict.
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 41/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to open a malicious Word
document. You learn from the WildFire report and AutoFocus that this document is known to have been used in Phishing campaigns since 2018.
What steps can you take to ensure that the same document is not opened by other users in your organization protected by the Cortex XDR agent?
A. Enable DLL Protection on all endpoints but there might be some false positives.
B. Create Behavioral Threat Protection (BTP) rules to recognize and prevent the activity.
C. No step is required because Cortex shares IOCs with our fellow Cyber Threat Alliance members.
Correct Answer: B
When investigating security events, which feature in Cortex XDR is useful for reverting the changes on the endpoint?
A. Remediation Automation
B. Machine Remediation
C. Automatic Remediation
D. Remediation Suggestions
Correct Answer: D
Selected Answer: D
I will pick D
https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Remediate-Changes-from-Malicious-Activity
When investigating suspicious incidents and causality chains you often need to restore and revert changes made to your endpoints as result of a
malicious activity. To avoid manually searching for the affected files and registry keys on your endpoints, you can request Cortex XDR for
remediation suggestions.
upvoted 1 times
A. a local storage facility where your logs and alert data can be aggregated
D. the workspace for your Cortex XDR agents to detonate potential malware files
Correct Answer: B
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 42/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
Correct Answer: B
D. The script is run on the machine uploading the script to ensure that it is operational.
Correct Answer: A
A. WildFire runs in the cloud and analyses alert data from the XDR agent to check for behavioural threats.
B. WildFire is the engine that runs on the local agent and determines whether behavioural threats are occurring on the endpoint.
D. WildFire runs entirely on the agent to quickly analyse samples and provide a verdict.
Correct Answer: C
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 43/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
A Linux endpoint with a Cortex XDR Pro per Endpoint license and Enhanced Endpoint Data enabled has reported malicious activity, resulting in the
creation of a file that you wish to delete. Which action could you take to delete the file?
B. Open X2go from the Cortex XDR console and delete the file via X2go.
D. Open an NFS connection from the Cortex XDR console and delete the file.
Correct Answer: A
Selected Answer: C
I think the answer is C. See this overview from Palo Alto: https://youtu.be/HBzxmSjHYt4?si=JqjrLZkLTXBeqXpp&t=452. Here he talks about deleting
a file through the Remediation Suggestions.
upvoted 3 times
Which of the following best defines the Windows Registry as used by the Cortex XDR agent?
A. a hierarchical database that stores settings for the operating system and for applications
B. a system of files used by the operating system to commit memory that exceeds the available hardware resources. Also known as the
“swap”
C. a central system, available via the internet, for registering officially licensed versions of software to prove ownership
D. a ledger for maintaining accurate and up-to-date information on total disk usage and disk space remaining available to the operating
system
Correct Answer: A
Which statement best describes how Behavioral Threat Protection (BTP) works?
B. BTP runs on the Cortex XDR and distributes behavioral signatures to all agents.
D. BTP uses machine Learning to recognize malicious activity even if it is not known.
Correct Answer: D
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 44/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
Correct Answer: C
Selected Answer: B
Should be B. "You can initiate a remediation suggestions analysis from either of the following places:
In the Incident View, navigate to Actions → Remediation Suggestions."
https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Remediate-Changes-from-Malicious-
Activity#:~:text=In%20the%20Incident%20View%2C%20navigate%20to%20Actions%20%E2%86%92%20Remediation%20Suggestions.
upvoted 2 times
In Cortex XDR management console scheduled reports can be forwarded to which of the following applications/services?
A. Service Now
B. Slack
C. Salesforce
D. Jira
Correct Answer: B
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 45/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
A. Source port
B. Destination IP Address
C. Destination IP Address:Destination
D. Source IP Address
Correct Answer: B
Selected Answer: B
I agree for B
upvoted 1 times
Selected Answer: B
https://docs-cortex.paloaltonetworks.com/r/Cortex-XSIAM/Cortex-XSIAM-Administrator-Guide/Working-with-
IOCs#:~:text=Domain-,Destination%20IP%20address,-MD5%20hash
upvoted 2 times
What is the action taken out by Managed Threat Hunting team for Zero Day Exploits?
A. MTH runs queries and investigative actions and no further action is taken.
C. MTH researches for threats in the tenant and generates a report with the findings.
D. MTH pushes content updates to prevent against the zero day exploits.
Correct Answer: C
Correct Answer: B
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 46/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
What should you do to automatically convert leads into alerts after investigating a lead?
A. Lead threats can't be prevented in the future because they already exist in the environment.
B. Build a search query using Query Builder or XQL using a list of IOCs.
C. Create IOC rules based on the set of the collected attribute-value pairs over the affected entities concluded during the lead hunting.
D. Create BIOC rules based on the set of the collected attribute-value pairs over the affected entities concluded during the lead hunting.
Correct Answer: C
Selected Answer: D
Create BIOC rules based on the set of attribute-value pairs to automatically convert the leads into alerts.
upvoted 1 times
Selected Answer: D
When reaching out to TAC for additional technical support related to a Security Event; what are two critical pieces of information you need to
Correct Answer: BD
Selected Answer: BD
I can't cite the source, but I believe the answers should be B and D
upvoted 1 times
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 47/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which function describes the removal of a specific file from its location on a local or removable drive to a protected folder to prevent the file from
being executed?
B. Quarantine
C. Isolation
Correct Answer: B
Selected Answer: B
What is the maximum number of agents one Broker VM local agent applet can support?
A. 10,000
B. 15,000
C. 5,000
D. 20,000
Correct Answer: C
Selected Answer: C
I agree this is old so probably won't be on the test but good to know if it is.
upvoted 1 times
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 48/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
A. Actions on the objective >> Reconnaissance >> Weaponisation & Delivery >> Exploitation >> Installation >> Command & Control
B. Installation >> Reconnaissance >> Weaponisation & Delivery >> Exploitation >> Command & Control >> Actions on the objective
C. Reconnaissance >> Installation >> Weaponisation & Delivery >> Exploitation >> Command & Control >> Actions on the objective
D. Reconnaissance >> Weaponisation & Delivery >> Exploitation >> Installation >> Command & Control >> Actions on the objective
Correct Answer: D
Selected Answer: D
Which Exploit Protection Module (EPM) can be used to prevent attacks based on OS function?
B. DLL Security
C. UASLR
D. JIT Mitigation
Correct Answer: B
Selected Answer: B
Selected Answer: B
https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Prevent-Administrator-Guide/Endpoint-Protection-Modules
upvoted 1 times
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 49/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
Correct Answer: D
Selected Answer: D
Correct Answer: C
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 50/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
Which of the following Live Terminal options are available for Android systems?
D. Stop an app.
Correct Answer: B
A. Field
B. Bin
C. Dataset
D. Arrayexpand
Correct Answer: C
Selected Answer: C
from coursework
upvoted 1 times
Which minimum Cortex XDR agent version is required for Kubernetes Cluster?
Correct Answer: C
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 51/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
In the Cortex XDR console, from which two pages are you able to manually perform the agent upgrade action? (Choose two.)
A. Endpoint Administration
B. Asset Management
C. Action Center
D. Agent Installations
Correct Answer: AC
A. Python 3 with specific XDR Python libraries developed by Palo Alto Networks
D. Python 2 and 3 with specific XDR Python libraries developed by Palo Alto Networks
Correct Answer: A
Selected Answer: B
The Answer is B.
https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Initiate-a-Live-Terminal-
Session#:~:text=The%20Python%20command%20interpreter%20uses%20Unix%20command%20syntax%20and%20supports%20Python%203%20
with%20standard%20Python%20libraries
upvoted 6 times
Under which conditions is Local Analysis evoked to evaluate a file before the file is allowed to run?
Correct Answer: B
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 52/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
A. A dataset is a Cortex data lake data source only; presets are built-in data source.
C. A dataset is a built-in or third party source; presets group XDR data fields.
Correct Answer: C
Selected Answer: C
https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-XQL-Language-Reference/Datasets-and-Presets
Datasets - The standard, built-in data source that is available in every Cortex XDR instance is the xdr_data dataset.This dataset is comprised of both
raw EDR events reported by the Cortex XDR agent, and of logs from different sources such as third-party logs.
Presets - Presets offer groupings of xdr_data fields that are useful for analyzing specific areas of network and endpoint activity.
upvoted 1 times
Cortex XDR is deployed in the enterprise and you notice a cobalt strike attack via an ongoing supply chain compromise was prevented on 1 server.
What steps can you take to ensure the same protection is extended to all your servers?
A. Enable DLL Protection on all servers but there might be some false positives.
C. Create IOCs of the malicious files you have found to prevent their execution.
D. Enable Behavioral Threat Protection (BTP) with cytool to prevent the attack from spreading.
Correct Answer: D
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 53/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
Why would one threaten to encrypt a hypervisor or, potentially, a multiple number of virtual machines running on a server?
Correct Answer: A
What types of actions you can execute with live terminal session?
A. Manage Processes, Manage Files, Run Operating System Commands, Run Python Commands and Scripts
C. Apply patches, Reboot System, Send notification for end user, Run Python Commands and Scripts
D. Manage Processes, Manage Files, Run Operating System Commands, Run Ruby Commands and Scripts
Correct Answer: A
How can you pivot within a row to Causality view and Timeline views for further investigate?
D. You can't pivot within a row to Causality view and Timeline views
Correct Answer: C
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 54/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
What motivation do ransomware attackers have for returning access to systems once their victims have paid?
A. Failure to restore access to systems undermines the scheme because others will not believe their valuables would be returned.
B. The ransomware attackers hope to trace the financial trail back and steal more from traditional banking institutions.
C. There is organized crime governance among attackers that requires the return of access to remain in good standing.
D. Nation-states enforce the return of system access through the use of laws and regulation.
Correct Answer: A
What is the WildFire analysis file size limit for Windows PE files?
A. 500MB
B. 100MB
C. 1GB
D. No Limit
Correct Answer: B
Which Exploit Prevention Module (EPM) provides better entropy for randomization of memory locations?
A. UASLR
B. JIT Mitigation
D. DLL Security
Correct Answer: A
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 55/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
To stop a network-based attack, any interference with a portion of the attack pattern is enough to prevent it from succeeding. Which statement is
B. It does not interfere with any portion of the pattern on the endpoint.
C. It does not need to interfere with the any portion of the pattern to prevent the attack.
Correct Answer: B
The Cortex XDR console has triggered an incident, blocking a vitally important piece of software in your organization that is known to be benign.
Which of the following options would prevent Cortex XDR from blocking this software in the future, for all endpoints in your organization?
Correct Answer: D
What kind of malware uses encryption, data theft, denial of service, and possibly harassment to take advantage of a victim?
A. Rootkit
B. Keylogger
C. Ransomware
D. Worm
Correct Answer: C
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 56/57
2024/3/24 中午12:17 PCDRA Exam - Free Actual Q&As, Page 1 | ExamTopics
As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to open a malicious Word
document. You learn from the WildFire report and AutoFocus that this document is known to have been used in Phishing campaigns since 2018.
What steps can you take to ensure that the same document is not opened by other users in your organization protected by the Cortex XDR agent?
A. Enable DLL Protection on all endpoints but there might be some false positives.
B. No step is required because Cortex shares IOCs with our fellow Cyber Threat Alliance members.
Correct Answer: D
Can you disable the ability to use the Live Terminal feature in Cortex XDR?
Correct Answer: D
https://www.examtopics.com/exams/palo-alto-networks/pcdra/custom-view/ 57/57