What is the cause when alerts generated by a correlation rule are not creating an incident?
Answer : C
While investigating an incident on the Incident Overview page, an analyst notices that the playbook encountered an error. Upon playbook work plan review, it is determined that the error was caused by a timeout. However, the analyst does not have the necessary permissions to fix or create a new playbook.
Given the critical nature of the incident, what can the analyst do to ensure the playbook continues executing the remaining steps?
Answer : A
Which configuration will ensure any alert involving a specific critical asset will always receive a score of 100?
Answer : D
How would Incident Context be referenced in an alert War Room task or alert playbook task?
Answer : A
Which feature terminates a process during an investigation?
Answer : A
Which statement applies to a low-severity alert when a playbook trigger has been configured?
Answer : B
A threat hunter discovers a true negative event from a zero-day exploit that is using privilege escalation to launch "Malware.pdf.exe."
Which XQL query will always show the correct user context used to launch "Malware.pdf.exe"?
Answer : C
Based on the image below, which two additional steps should a SOC analyst take to secure the endpoint? (Choose two.)
Answer : CD
During an investigation of an alert with a completed playbook, it is determined that no indicators exist from the email "[email protected]” in the Key Assets & Artifacts tab of the parent incident.
Which command will determine if Cortex XSIAM has been configured to extract indicators as expected?
Answer : B
In the Endpoint Data context menu of the Cortex XSIAM endpoints table, where will an analyst be able to determine which users accessed an endpoint via Live Terminal?
Answer : B
With regard to Attack Surface Rules, how often are external scans updated?
Answer : B
What is the expected behavior when querying a data model with no specific fields specified in the query?
Answer : D
An on-demand malware scan of a Windows workstation using the Cortex XDR agent is successful and detects three malicious files. An analyst attempts further investigation of the files by right-clicking on the scan result, selecting "Additional data," then "View related alerts," but no alerts are reported.
What is the reason for this outcome?
Answer : B
A Cortex XSIAM analyst in a SOC is reviewing an incident involving a workstation showing signs of a potential breach. The incident includes an alert from Cortex XDR Analytics Alert source: "Remote service command execution from an uncommon source." As part of the incident handling process, the analyst must apply response actions to contain the threat effectively.
Which initial Cortex XDR agent response action should be taken to reduce attacker mobility on the network?
Answer : C
A security analyst has been assigned a ticket from the help desk stating that users are experiencing errors when attempting to open files on a specific network share. These errors state that the file format cannot be opened. IT has verified that the file server is online and functioning, but that all files have unusual extensions attached to them.
The security analyst reviews alerts within Cortex XSIAM and identifies malicious activity related to a possible ransomware attack on the file server. This incident is then escalated to the incident response team for further investigation.
Upon reviewing the incident, the responders confirm that ransomware was successfully executed on the file server. Other details of the attack are noted below:
An unpatched vulnerability on an externally facing web server was exploited for initial access
The attackers successfully used Mimikatz to dump sensitive credentials that were used for privilege escalation
PowerShell was used on a Windows server for additional discovery, as well as lateral movement to other systems
The attackers executed SystemBC RAT on multiple systems to maintain remote access
Ransomware payload was downloaded on the file server via an external site, "file.io"
Refer to the scenario to answer this question:
Which hunt collection category in Cortex XSIAM should the incident responders use to identify all systems where the attackers established persistence during the attack?
Answer : D
Have any questions or issues ? Please dont hesitate to contact us