What license would be required for ingesting external logs from various vendors?
A. Cortex XDR Pro per Endpoint
B. Cortex XDR Vendor Agnostic Pro
C. Cortex XDR Pro per TB
D. Cortex XDR Cloud per Host
Which license is required when deploying Cortex XDR agent on Kubernetes Clusters as a DaemonSet?
A. Cortex XDR Pro per TB
B. Host Insights
C. Cortex XDR Pro per Endpoint
D. Cortex XDR Cloud per Host
Which type of IOC can you define in Cortex XDR?
A. Destination IP Address
B. Source IP Address
C. Source port
D. Destination IPAddress: Destination
What is the Wildfire analysis file size limit for Windows PE files?
A. No Limit
B. 500MB
C. 100MB
D. 1GB
What is the action taken out by Managed Threat Hunting team for Zero Day Exploits?
A. MTH researches for threats in the tenant and generates a report with the findings.
B. MTH researches for threats in the logs and reports to engineering.
C. MTH runs queries and investigative actions and no further action is taken.
D. MTH pushes content updates to prevent against thezero-dayexploits.
Cortex XDR is deployed in the enterprise and you notice a cobalt strike attack via an ongoing supply chain compromise was prevented on 1 server. What steps can you take to ensure the same protection is extended to all your servers?
A. Conduct a thorough Endpoint Malware scan.
B. Enable DLL Protection on all servers but there might be some false positives.
C. Enable Behavioral Threat Protection (BTP) with cytool to prevent the attack from spreading.
D. Create lOCs of the malicious files you have found to prevent their execution.
Which of the following paths will successfully activate Remediation Suggestions?
A. Incident View > Actions > Remediation Suggestions
B. Causality View > Actions > Remediation Suggestions
C. Alerts Table > Right-click on a process node > Remediation Suggestions
D. Alerts Table > Right-click on an alert > Remediation Suggestions
When using the "File Search and Destroy" feature, which of the following search hash type is supported?
A. SHA256 hash of the file
B. AES256 hash of the file
C. MD5 hash of the file
D. SHA1 hash of the file
A file is identified as malware by the Local Analysis module whereas WildFire verdict is Benign, Assuming WildFire is accurate. Which statement is correct for the incident?
A. It is true positive.
B. It is false positive.
C. It is a false negative.
D. It is true negative.
When viewing the incident directly, what is the "assigned to" field value of a new Incident that was just reported to Cortex?
A. Pending
B. It is blank
C. Unassigned
D. New