[Cortex XDR Agent Configuration]
Based on the Malware profile image below, what happens when a new custom-developed
application attempts to execute on an endpoint?
B
[Data Ingestion and Integration]
Which configuration profile option with an available built-in template can be applied to both
Windows and Linux systems by using XDR Collector?
A
[Detection Engineering]
What is the earliest time frame an alert could be automatically generated once the conditions of a
new correlation rule are met?
C
[Detection Engineering]
A Custom Prevention rule that was determined to be a false positive alert needs to be tuned. The
behavior was determined to be authorized and expected on the affected endpoint. Based on the
image below, which two steps could be taken? (Choose two.)
[Image description: A Custom Prevention rule configuration, assumed to trigger a Behavioral
Indicator of Compromise (BIOC) alert for authorized behavior]
A,B
[Data Ingestion and Integration]
In addition to using valid authentication credentials, what is required to enable the setup of the
Database Collector applet on the Broker VM to ingest database activity?
A
[Data Ingestion and Integration]
Which step is required to configure a proxy for an XDR Collector?
A
[Maintenance and Troubleshooting]
How long is data kept in the temporary hot storage cache after being queried from cold storage?
B
[Post-Deployment Management and Configuration]
Which components may be included in a Cortex XDR content update?
B
[Maintenance and Troubleshooting]
An insider compromise investigation has been requested to provide evidence of an unauthorized
removable drive being mounted on a company laptop. Cortex XDR agent is installed with default
prevention agent settings profile and default extension "Device Configuration" profile. Where can an
engineer find the evidence?
A
[Cortex XDR Agent Configuration]
A static endpoint group is created by adding 321 endpoints using the Upload From File feature.
However, after group creation, the members count field shows 244 endpoints. What are two possible
reasons why endpoints were not added to the group? (Choose two.)
C,D