Whichfour types of Traps logs are stored within Cortex Data Lake?
A. Threat, Config, System,Data
B. Threat, Config, System, Analytic
C. Threat, Monitor. System, Analytic
D. Threat, Config, Authentication, Analytic
What method does the Traps agent use to identify malware during a scheduled scan?
A. Heuristic analysis
B. Local analysis
C. Signature comparison
D. WildFire hash comparison and dynamic analysis
What is the difference between an exception and an exclusion?
A. An exception is based on rules and exclusions are on alerts
B. An exclusion is based on rules and exceptions are based on alerts.
C. An exception does not exist
D. An exclusion does not exist
A customer wants to modify the retention periods of their Threat logs in Cortex Data Lake.
Where would the user configure the ratio of storage for each log type?
A. Within the TMS, create an agent settings profile and modify the Disk Quota value
B. It is not possible to configure Cortex Data Lake quota for specific log types.
C. Go to the Cortex Data Lake App in Cloud Services, then choose Configuration and modify the Threat Quota
D. Write a GPO for each endpoint agent to check in less often
How do sub-playbooks affect the Incident Context Data?
A. When set to private, task outputs do not automatically get written to the root context
B. When set to private, task outputs automatically get written to the root context
C. When set to global, allows parallel task execution.
D. When set to global, sub-playbook tasks do not have access to the root context
Which task allows the playbook to follow different paths based on specific conditions?
A. Conditional
B. Automation
C. Manual
D. Parallel
Which deployment type supports installation of an engine on Windows, Mac OS. and Linux?
A. RPM
B. SH
C. DEB
D. ZIP
How does DBot score an indicator that has multiple reputation scores?
A. uses the most severe score scores
B. the reputation as undefined
C. uses the average score
D. uses the least severe score
Which two formats are supported by Whitelist? (Choose two)
A. Regex
B. STIX
C. CSV
D. CIDR
Which two log types should be configuredfor firewall forwarding to the Cortex Data Lake for use by Cortex XDR?(Choose two)
A. Security Event
B. HIP
C. Correlation
D. Analytics
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Palo Alto Networks exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your PSE-CORTEX exam preparations and Palo Alto Networks certification application, do not hesitate to visit our Vcedump.com to find your solutions here.