Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

Palo Alto Networks System Engineer - Cortex Professional Question and Answers

Palo Alto Networks System Engineer - Cortex Professional

Last Update Oct 16, 2025
Total Questions : 168

We are offering FREE PSE-Cortex Paloalto Networks exam questions. All you do is to just go and sign up. Give your details, prepare PSE-Cortex free exam questions and then go for complete pool of Palo Alto Networks System Engineer - Cortex Professional test questions that will help you more.

PSE-Cortex pdf

PSE-Cortex PDF

$42  $104.99
PSE-Cortex Engine

PSE-Cortex Testing Engine

$50  $124.99
PSE-Cortex PDF + Engine

PSE-Cortex PDF + Testing Engine

$66  $164.99
Questions 1

"Bob" is a Demisto user. Which command is used to add 'Bob" to an investigation from the War Room CLI?

Options:

A.  

#Bob

B.  

/invite Bob

C.  

@Bob

D.  

!invite Bob

Discussion 0
Questions 2

Which playbook functionality allows grouping of tasks to create functional building blocks?

Options:

A.  

playbook features

B.  

sub-playbooks

C.  

conditional tasks

D.  

manual tasks

Discussion 0
Questions 3

The prospect is deciding whether to go with a phishing or a ServiceNow use case as part of their POC We have integrations for both but a playbook for phishing only Which use case should be used for the POC?

Options:

A.  

phishing

B.  

either

C.  

ServiceNow

D.  

neither

Discussion 0
Questions 4

A customer has purchased Cortex Data Lake storage with the following configuration, which requires 2 TB of Cortex Data Lake to order:

support for 300 total Cortex XDR clients all forwarding Cortex XDR data with 30-day retention

storage for higher fidelity logs to support Cortex XDR advanced analytics

The customer now needs 1000 total Cortex XDR clients, but continues with 300 clients forwarding Cortex XDR data with 30-day retention.

What is the new total storage requirement for Cortex Data Lake storage to order?

Options:

A.  

16 TB

B.  

4 TB

C.  

8 TB

D.  

2 TB

Discussion 0
Questions 5

A Cortex XSOAR customer wants to send a survey to users asking them to input their manager's email for a training use case so the manager can receive status reports on the employee's training. However, the customer is concerned users will provide incorrect information to avoid sending status updates to their manager.

How can Cortex XSOAR most efficiently sanitize user input prior to using the responses in the playbook?

Options:

A.  

Create a task that sends the survey responses to the analyst via email. If the responses are incorrect, the analyst fills out the correct response in the survey.

B.  

Create a manual task to ask the analyst to validate the survey response in the platform.

C.  

Create a sub-playbook and import a list of manager emails into XSOAR. Use a conditional task comparison to check if the response matches an email on the list. If no matches are found, loop the sub-playbook and send the survey back to the user until a match is found.

D.  

Create a conditional task comparison to check if the response contains a valid email address.

Discussion 0
Questions 6

A prospective customer is interested in Cortex XDR but is enable to run a product evaluation.

Which tool can be used instead to showcase Cortex XDR?

Options:

A.  

Test Flight

B.  

War Game

C.  

Tech Rehearsal

D.  

Capture the Flag

Discussion 0
Questions 7

Which two filter operators are available in Cortex XDR? (Choose two.)

Options:

A.  

not Contains

B.  

!*

C.  

=>

D.  

< >

Discussion 0
Questions 8

Which playbook feature allows concurrent execution of tasks?

Options:

A.  

parallel tasks

B.  

automation tasks

C.  

manual tasks

D.  

conditional tasks

Discussion 0
Questions 9

An Administrator is alerted to a Suspicious Process Creation security event from multiple users.

The users believe that these events are false positives Which two steps should the administrator take to confirm the false positives and create an exception? (Choose two )

Options:

A.  

With the Malware Security profile, disable the "Prevent Malicious Child Process Execution" module

B.  

Within the Malware Security profile add the specific parent process, child process, and command line argument to the child process whitelist

C.  

In the Cortex XDR security event, review the specific parent process, child process, and command line arguments

D.  

Contact support and ask for a security exception.

Discussion 0
Questions 10

Cortex XSOAR has extracted a malicious Internet Protocol (IP) address involved in command-and-control (C2) traffic.

What is the best method to block this IP from communicating with endpoints without requiring a configuration change on the firewall?

Options:

A.  

Have XSOAR automatically add the IP address to a threat intelligence management (TIM) malicious IP list to elevate priority of future alerts.

B.  

Have XSOAR automatically add the IP address to a deny rule in the firewall.

C.  

Have XSOAR automatically add the IP address to an external dynamic list (EDL) used by the firewall.

D.  

Have XSOAR automatically create a NetOps ticket requesting a configuration change to the firewall to block the IP.

Discussion 0
Questions 11

In the DBotScore context field, which context key would differentiate between multiple entries for the same indicator in a multi-TIP environment?

Options:

A.  

Vendor

B.  

Type

C.  

Using

D.  

Brand

Discussion 0
Questions 12

The images show two versions of the same automation script and the results they produce when executed in Demisto. What are two possible causes of the exception thrown in the second Image? (Choose two.)

SUCCESS

Options:

A.  

The modified scnpt was run in the wrong Docker image

B.  

The modified script required a different parameter to run successfully.

C.  

The dictionary was defined incorrectly in the second script.

D.  

The modified script attempted to access a dictionary key that did not exist in the dictionary named "data”

Discussion 0
Questions 13

Which Linux OS command will manually load Docker images onto the Cortex XSOAR server in an air-gapped environment?

Options:

A.  

sudo repoquery -a --installed

B.  

sudo demistoserver-x.x-xxxx.sh -- -tools=load

C.  

sudo docker ps load

D.  

sudo docker load -i YOUR_DOCKER_FILE.tar

Discussion 0
Questions 14

How can Cortex XSOAR save time when a phishing incident occurs?

Options:

A.  

It can automatically email staff to warn them about the phishing attack and show them a copy of the email.

B.  

It can automatically respond to the phishing email to unsubscribe from future emails.

C.  

It can automatically purge the email from user mailboxes in which it has not yet opened.

D.  

It can automatically identify every mailbox that received the phish and create corresponding cases for them.

Discussion 0
Questions 15

Which statement applies to the malware protection flow of the endpoint agent in Cortex XSIAM?

Options:

A.  

A tile from an allowed signer is exempt from local analysis.

B.  

Local analysis always happens before a WildFire verdict check.

C.  

Hash comparisons come after local static analysis.

D.  

The block list is verified in the final step.

Discussion 0
Questions 16

What is the requirement for enablement of endpoint and network analytics in Cortex XDR?

Options:

A.  

Cloud Identity Engine configured and enabled

B.  

Network Mapper applet on the Broker VM configured and enabled

C.  

Logs from at least 30 endpoints over a minimum of two weeks

D.  

Windows DHCP logs ingested via a Cortex XDR collector

Discussion 0
Questions 17

A customer has purchased Cortex XDR and requires phone support for the product.

Which Palo Alto Networks offering would fulfill this need?

Options:

A.  

Platinum Success

B.  

Premium Success

C.  

Diamond Success

D.  

Standard Success

Discussion 0
Questions 18

Which command is used to add Cortex XSOAR "User1" to an investigation from the War Room command-line interface (CLI)?

Options:

A.  

/invite User1

B.  

#User1

C.  

@User1

D.  

!invite User1

Discussion 0
Questions 19

Which integration allows searching and displaying Splunk results within Cortex XSOAR?

Options:

A.  

SplunkPY integration

B.  

Demisto App for Splunk integration

C.  

XSOAR REST API integration

D.  

Splunk integration

Discussion 0
Questions 20

A General Purpose Dynamic Section can be added to which two layouts for incident types? (Choose two)

Options:

A.  

"Close" Incident Form

B.  

Incident Summary

C.  

Incident Quick View

D.  

"New"/Edit" Incident Form

Discussion 0
Questions 21

A customer has purchased Cortex XDR and requires 24/7 monitoring of the platform. However, the customer only has staff available during business hours.

Which Palo Alto Networks offering would best meet this requirement?

Options:

A.  

Security Orchestration, Automation and Response

B.  

Security Information and Event Management

C.  

Managed Detection and Response

D.  

Network Detection and Response

Discussion 0
Questions 22

An antivirus refresh project was initiated by the IT operations executive. Who is the best source for discussion about the project's operational considerations'?

Options:

A.  

endpoint manager

B.  

SOC manager

C.  

SOC analyst

D.  

desktop engineer

Discussion 0
Questions 23

Which attack method is a result of techniques designed to gain access through vulnerabilities in the code of an operating system (OS) or application?

Options:

A.  

exploit

B.  

malware

C.  

phishing

D.  

ransomware

Discussion 0
Questions 24

What is the primary function of an engine in Cortex XSOAR?

Options:

A.  

To execute playbooks, scripts, commands, and integrations

B.  

To manage multiple Cortex XSOAR tenants

C.  

To provide a user interface for security analysts

D.  

To store and manage incident data, remediation plans, and documentation

Discussion 0
Questions 25

An adversary attempts to communicate with malware running on a network in order to control malware activities or to exfiltrate data from the network.

Which Cortex XDR Analytics alert will this activity most likely trigger?

Options:

A.  

uncommon local scheduled task creation

B.  

malware

C.  

new administrative behavior

D.  

DNS Tunneling

Discussion 0
Questions 26

How does Cortex XSOAR automation save time when a phishing incident occurs?

Options:

A.  

By developing an integration.

B.  

By responding to management with risk scores

C.  

By purging unopened phishing email from user mailboxes

D.  

By emailing staff to inform them of phishing attack in advance

Discussion 0
Questions 27

What are process exceptions used for?

Options:

A.  

whitelist programs from WildFire analysis

B.  

permit processes to load specific DLLs

C.  

change the WildFire verdict for a given executable

D.  

disable an EPM for a particular process

Discussion 0
Questions 28

What is a key difference between audit users and full users in Cortex XSOAR?

Options:

A.  

Audit users can only view incidents, while full users can edit system components.

B.  

Full users can only view dashboards, while audit users can investigate incidents.

C.  

Audit users have read-only permission, white full users have read-write permission.

D.  

Audit users can run scripts and playbooks, while full users can only view reports.

Discussion 0
Questions 29

Which statement applies to the malware protection flow in Cortex XDR Prevent?

Options:

A.  

Local static analysis happens before a WildFire verdict check.

B.  

In the final step, the block list is verified.

C.  

A trusted signed file is exempt from local static analysis.

D.  

Hash comparisons come after local static analysis.

Discussion 0
Questions 30

The certificate used for decryption was installed as a trusted root CA certificate to ensure communication between the Cortex XDR Agent and Cortex XDR Management Console What action needs to be taken if the administrator determines the Cortex XDR Agents are not communicating with the Cortex XDR Management Console?

Options:

A.  

add paloaltonetworks com to the SSL Decryption Exclusion list

B.  

enable SSL decryption

C.  

disable SSL decryption

D.  

reinstall the root CA certificate

Discussion 0
Questions 31

Which option is required to prepare the VDI Golden Image?

Options:

A.  

Configure the Golden Image as a persistent VDI

B.  

Use the Cortex XDR VDI tool to obtain verdicts for all PE files

C.  

Install the Cortex XOR Agent on the local machine

D.  

Run the Cortex VDI conversion tool

Discussion 0
Questions 32

Which Cortex XSIAM feature can be used to onboard data sources?

Options:

A.  

Marketplace Integration

B.  

Playbook

C.  

Data Ingestion Dashboard

D.  

Asset Inventory

Discussion 0
Questions 33

A Cortex XSOAR customer has a phishing use case in which a playbook has been implemented with one of the steps blocking a malicious URL found in an email reported by one of the users.

What would be the appropriate next step in the playbook?

Options:

A.  

Email the CISO to advise that malicious email was found.

B.  

Disable the user's email account.

C.  

Email the user to confirm the reported email was phishing.

D.  

Change the user's password.

Discussion 0
Questions 34

If a customer activates a TMS tenant and has not purchased a Cortex Data Lake instance.

Palo Alto Networks will provide the customer with a free instance

What size is this free Cortex Data Lake instance?

Options:

A.  

1 TB

B.  

10 GB

C.  

100 GB

D.  

10 TB

Discussion 0
Questions 35

An administrator has a critical group of systems running Windows XP SP3 that cannot be upgraded The administrator wants to evaluate the ability of Traps to protect these systems and the word processing applications running on them

How should an administrator perform this evaluation?

Options:

A.  

Gather information about the word processing applications and run them on a Windows XP SP3 VM Determine if any of the applications are vulnerable and run the exploit with an exploitation tool

B.  

Run word processing exploits in a latest version of Windows VM in a controlled and isolated environment. Document indicators of compromise and compare to Traps protection capabilities

C.  

Run a known 2015 flash exploit on a Windows XP SP3 VM. and run an exploitation tool that acts as a listener Use the results to demonstrate Traps capabilities

D.  

Prepare the latest version of Windows VM Gather information about the word processing applications, determine if some of them are vulnerable and prepare a working exploit for at least one of them Execute with an exploitation tool

Discussion 0
Questions 36

Which resource can a customer use to ensure that the Cortex XDR agent will operate correctly on their CentOS 07 servers?

Options:

A.  

Administrator Guide

B.  

Compatibility Matrix

C.  

Release Notes

D.  

LIVE community

Discussion 0
Questions 37

Which process in the causality chain does the Cortex XDR agent identify as triggering an event sequence?

Options:

A.  

the relevant shell

B.  

The causality group owner

C.  

the adversary's remote process

D.  

the chain's alert initiator

Discussion 0
Questions 38

Rearrange the steps into the correct order for modifying an incident layout.

Options:

Discussion 0
Questions 39

What is the size of the free Cortex Data Lake instance provided to a customer who has activated a TMS tenant, but has not purchased a Cortex Data Lake instance?

Options:

A.  

10 GB

B.  

1 TB

C.  

10 TB

D.  

100 GB

Discussion 0
Questions 40

Which Cortex XDR license is required for a customer that requests endpoint detection and response (EDR) data collection capabilities?

Options:

A.  

Cortex XDR Pro per TB

B.  

Cortex XDR Endpoint

C.  

Cortex XDR Prevent

D.  

Cortex XDR Pro Per Endpoint

Discussion 0
Questions 41

Which product enables the discovery, exchange, and contribution of security automation playbooks, built into Cortex XSOAR?

Options:

A.  

XSOAR Threat Intelligence Platform (TIP)

B.  

XSOAR Automated Systems

C.  

XSOAR Ticketing Systems

D.  

XSOAR Marketplace

Discussion 0
Questions 42

A prospect has agreed to do a 30-day POC and asked to integrate with a product that Demisto currently does not have an integration with. How should you respond?

Options:

A.  

Extend the POC window to allow the solution architects to build it

B.  

Tell them we can build it with Professional Services.

C.  

Tell them custom integrations are not created as part of the POC

D.  

Agree to build the integration as part of the POC

Discussion 0
Questions 43

Which two areas of Cortex XDR are used for threat hunting activities? (Choose two.)

Options:

A.  

indicators of compromise (IOC) rules

B.  

query builder

C.  

live terminal

D.  

host insights module

Discussion 0
Questions 44

Which deployment type supports installation of an engine on Windows, Mac OS. and Linux?

Options:

A.  

RPM

B.  

SH

C.  

DEB

D.  

ZIP

Discussion 0
Questions 45

Which two formats are supported by Whitelist? (Choose two)

Options:

A.  

Regex

B.  

STIX

C.  

CSV

D.  

CIDR

Discussion 0
Questions 46

How does a clear understanding of a customer’s technical expertise assist in a hand off following the close of an opportunity?

Options:

A.  

It enables customers to prepare for audits so they can demonstrate compliance.

B.  

It helps in assigning additional technical tasks to the customer

C.  

It allows implementation teams to bypass initial scoping exercises

D.  

It enables post-sales teams to tailor their support and training appropriately

Discussion 0
Questions 47

Which Cortex XDR capability prevents running malicious files from USB-connected removable equipment?

Options:

A.  

Device customization

B.  

Agent configuration

C.  

Agent management

D.  

Restrictions profile

Discussion 0
Questions 48

Which two filter operators are available in Cortex XDR? (Choose two.)

Options:

A.  

< >

B.  

Contains

C.  

=

D.  

Is Contained By

Discussion 0
Questions 49

Which feature of Cortex Xpanse allows it to identify previously unknown assets?

Options:

A.  

Dynamic asset registration

B.  

Scheduled network scanning

C.  

Continuous internet scanning

D.  

Active directory enumeration

Discussion 0
Questions 50

Which service helps identify attackers by combining world-class threat intelligence with Cortex XSIAM technology?

Options:

A.  

Virtual Desktop Infrastructure

B.  

Managed Threat Hunting

C.  

Threat Intelligence Platform

D.  

Cloud Identity Engine

Discussion 0