DumpsFiles
 Request Exam  Contact
  • Home
  • PRACTICE EXAMS
    Oracle
    Fortinet
    Juniper
    Microsoft
    Cisco
    Citrix
    CompTIA
    VMware
    SAP
    EMC
    PMI
    HP
    Salesforce
    Other
  • View All Exams
  • New Dumps Files
  • Upload
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. Palo Alto Networks
  3. Palo Alto Networks XDR Engineer
  4. PaloAltoNetworks.XDR-Engineer.v2025-10-29.q17
  5. Question 9
Verified By Experts
40%off

XDR-Engineer Premium Bundle

Latest XDR-Engineer Exam Premium Dumps provide by TrainingDump.com to help you Passing XDR-Engineer Exam! TrainingDump.com offers the updated XDR-Engineer exam dumps, the TrainingDump.com XDR-Engineer exam questions has been updated to correct Answer. Get the latest TrainingDump.com XDR-Engineer pdf dumps with Exam Engine here:


(52 Q&As Dumps, 40%OFF Special Discount: DumpsFiles)

Join the discussion

Question 9/17

An XDR engineer is configuring an automation playbook to respond to high-severity malware alerts by automatically isolating the affected endpoint and notifying the security team via email. The playbook should only trigger for alerts generated by the Cortex XDR analytics engine, not custom BIOCs. Which two conditions should the engineer include in the playbook trigger to meet these requirements? (Choose two.)

Correct Answer: A,C
In Cortex XDR,automation playbooks(also referred to as response actions or automation rules) allow engineers to define automated responses to specific alerts based on trigger conditions. The playbook in this scenario needs to isolate endpoints and send email notifications for high-severity malware alerts generated by the Cortex XDR analytics engine, excluding custom BIOC alerts. To achieve this, the engineer must configure the playbook trigger with conditions that match the alert's severity, category, and source.
* Correct Answer Analysis (A, C):
* A. Alert severity is High: The playbook should only trigger for high-severity alerts, as specified in the requirement. Setting the conditionAlert severity is Highensures that only alerts with a severity level of "High" activate the playbook, aligning with the engineer's goal.
* C. Alert category is Malware: The playbook targets malware alerts specifically. The condition Alert category is Malwareensures that the playbook only responds to alerts categorized as malware, excluding other types of alerts (e.g., lateral movement, exploit).
* Why not the other options?
* B. Alert source is Cortex XDR Analytics: While this condition would ensure the playbook triggers only for alerts from the Cortex XDR analytics engine (and not custom BIOCs), the requirement to exclude BIOCs is already implicitly met because BIOC alerts are typically categorized differently (e.g., as custom alerts or specific BIOC categories). The alert category (Malware) and severity (High) conditions are sufficient to target analytics-driven malware alerts, and adding the source condition is not strictly necessary for the stated requirements. However, if the engineer wanted to be more explicit, this condition could be considered, but the question asks for the two most critical conditions, which are severity and category.
* D. Alert status is New: The alert status (e.g., New, In Progress, Resolved) determines the investigation stage of the alert, but the requirement does not specify that the playbook should only trigger for new alerts. Alerts with a status of "InProgress" could still be high-severity malware alerts requiring isolation, so this condition is not necessary.
Additional Note on Alert Source: The requirement to exclude custom BIOCs and focus on Cortex XDR analytics alerts is addressed by theAlert category is Malwarecondition, as analytics-driven malware alerts (e.
g., from WildFire or behavioral analytics) are categorized as "Malware," while BIOC alerts are often tagged differently (e.g., as custom rules). If the question emphasized the need to explicitly filter by source, option B would be relevant, but the primary conditions for the playbook are severity and category.
Exact Extract or Reference:
TheCortex XDR Documentation Portalexplains automation playbook triggers: "Playbook triggers can be configured with conditions such as alert severity (e.g., High) and alert category (e.g., Malware) to automate responses like endpoint isolation and email notifications" (paraphrased from the Automation Rules section).
TheEDU-262: Cortex XDR Investigation and Responsecourse covers playbook creation, stating that
"conditions like alert severity and category ensure playbooks target specific alert types, such as high-severity malware alerts from analytics" (paraphrased from course materials). ThePalo Alto Networks Certified XDR Engineer datasheetincludes "playbook creation and automation" as a key exam topic, encompassing trigger condition configuration.
References:
Palo Alto Networks Cortex XDR Documentation Portal:https://docs-cortex.paloaltonetworks.com/ EDU-262: Cortex XDR Investigation and Response Course Objectives Palo Alto Networks Certified XDR Engineer Datasheet:https://www.paloaltonetworks.com/services/education
/certification#xdr-engineer

Add Comments

Your email address will not be published. Required fields are marked *

insert code
Type the characters from the picture.
Rating:
Other Question (17q)
Q1. An administrator wants to employ reusable rules within custom parsing rules to apply consi...
Q2. The most recent Cortex XDR agents are being installed at a newly acquired company. A list ...
Q3. How are dynamic endpoint groups created and managed in Cortex XDR?...
Q4. During deployment of Cortex XDR for Linux Agents, the security engineering team is asked t...
Q5. An insider compromise investigation has been requested to provide evidence of an unauthori...
Q6. What happens when the XDR Collector is uninstalled from an endpoint by using the Cortex XD...
Q7. When isolating Cortex XDR agent components to troubleshoot for compatibility, which comman...
Q8. How can a Malware profile be configured to prevent a specific executable from being upload...
Q9. An XDR engineer is configuring an automation playbook to respond to high-severity malware ...
Q10. A cloud administrator reports high network bandwidth costs attributed to Cortex XDR operat...
Q11. Which statement describes the functionality of fixed filters and dashboard drilldowns in e...
Q12. A correlation rule is created to detect potential insider threats by correlating user logi...
Q13. What will enable a custom prevention rule to block specific behavior?...
Q14. A Custom Prevention rule that was determined to be a false positive alert needs to be tune...
Q15. Which components may be included in a Cortex XDR content update?...
Q16. What are two possible actions that can be triggered by a dashboard drilldown? (Choose two....
Q17. Some company employees are able to print documents when working from home, but not on netw...
[×]

Download PDF File

Enter your email address to download PaloAltoNetworks.XDR-Engineer.v2025-10-29.q17.pdf

Email:

DumpsFiles

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2025 DumpsFiles

www.dumpsfiles.com materials do not contain actual questions and answers from Cisco's certification exams.