A. Third-Party security devices
B. Cortex XDR agents
C. Palo Alto Networks Next-Generation Firewalls
D. Syslog servers
A. Python 3 with specific XDR Python libraries developed by Palo Alto Networks
B. Python 2 and 3 with standard Python libraries
C. Python 2 and 3 with specific XDR Python libraries developed by Palo Alto Networks
D. Python 3 with standard Python libraries
A. Host shpapy_win10 had the most vulnerabilities.
B. There is one low severity incident.
C. There is one informational severity alert.
D. This is an actual output of the Top 10 hosts with the most malware.
A. Automatic Remediation
B. Remediation Automation
C. Machine Remediation
D. Remediation Suggestions
A. BTP injects into known vulnerable processes to detect malicious activity.
B. BTP runs on the Cortex XDR and distributes behavioral signatures to all agents.
C. BTP matches EDR data with rules provided by Cortex XDR.
D. BTP uses machine Learning to recognize malicious activity even if it is not known.
A. SHA1 hash of the file
B. SHA256 hash of the file
C. AES256 hash of the file
D. MD5 hash of the file
A. Investigate several Incidents at once.
B. Delete the selected Incidents.
C. Assign incidents to an analyst in bulk.
D. Change the status of multiple incidents.
A. Dylib Hijacking
B. DDL Security
C. Hot Patch Protection
D. Kernel Integrity Monitor (KIM)
A. To potentially perform a Distributed Denial of Attack.
B. To extort a payment from a victim or potentially embarrass the owners.
C. To gain notoriety and potentially a consulting position.
D. To better understand the underlying virtual infrastructure.