Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

XSIAM-Engineer Sample Questions Answers

Questions 4

In the Incident War Room, which command is used to update incident fields identified in the incident layout?

Options:

A.

!setIncidentFields

B.

!setParentIncidentFields

C.

!setParentIncidentContext

D.

!updateParentIncidentFields

Buy Now
Questions 5

Which field is automatically mapped from the dataset to the data model when creating a data model rule?

Options:

A.

_event_type

B.

_insert_time

C.

_host_name

D.

_cloud_id

Buy Now
Questions 6

How can a Cortex XSIAM engineer resolve the issue when a SOC analyst escalates missing details after merging two similar incidents?

Options:

A.

Check the War Room of the destination incident.

B.

Examine the incident context of the source incident.

C.

Unmerge the incidents and copy the missing details into the incident notes.

D.

Check the child incident of the destination incident.

Buy Now
Questions 7

What is a key characteristic of a parsing rule in Cortex XSIAM?

Options:

A.

It uses regular expressions exclusively for data modifications, discards unmatched logs by default, and only retains fields with non-null values.

B.

It is bound to all vendors and products, performs data parsing once per log, and does not allow grouping.

C.

It is bound to a specific vendor and product, performs data parsing once per log, and does not allow grouping.

D.

It is bound to a specific vendor and product which allow grouping with a no-match policy, and retains all fields.

Buy Now
Questions 8

How will Cortex XSIAM help with raw log ingestion from third-party sources in an existing infrastructure?

Options:

A.

Any structured logs coming into it are left completely unchanged, and only metadata is added to the raw data.

B.

For structured logs, like CEF, LEEF, and JSON, it decouples the key-value pairs and saves them in table format.

C.

Any unstructured logs coming into it are left completely unchanged, and metadata is not added to the raw data.

D.

For unstructured logs, it decouples the key-value pairs and saves them in a table format.

Buy Now
Questions 9

Which option should be used when customizing a dashboard in Cortex XSIAM to include a widget that will display data filtered by more than one dynamic value?

Options:

A.

Free text/number

B.

Multi-select

C.

Fixed filter

D.

Single-select

Buy Now
Questions 10

Which two alert notification options can be configured without creating a playbook? (Choose two.)

Which two alert notification options can be configured without creating a playbook? (Choose two.)

Options:

A.

Pager Duty

B.

Email

C.

Slack

D.

SMS

Buy Now
Questions 11

What is the purpose of using rolling tokens to manage Cortex XDR agents?

Options:

A.

To periodically rotate encryption keys used for tenant communication

B.

To perform administration on agents without requiring static credentials

C.

To authorize agents to download and install content updates

D To temporarily disable the agents during maintenance windows

Buy Now
Questions 12

Which section of a parsing rule defines the newly created dataset?

Options:

A.

RULE

B.

COLLECT

C.

INGEST

D.

CONST

Buy Now
Questions 13

A file for a support exception that needs to be updated locally on a Linux endpoint has been supplied.

Which cytool command will upload this support exception file to the endpoint?

Options:

A.

cytool upload suexfile -target

B.

cytool upload suex -file

C.

cytool import suex -path

D.

cytool import suexfile -path

Buy Now
Questions 14

A Behavioral Threat Protection (BTP) alert is triggered with an action of "Prevented (Blocked)" on one of several application servers running Windows Server 2022. The investigation determines the involved processes to be legitimate core OS binaries, and the description from the triggered BTP rule is an acceptable risk for the company to allow the same activity in the future.

This type of activity is only expected on the endpoints that are members of the endpoint group "AppServers," which already has a separate prevention policy rule with an exceptions profile named "Exceptions-AppServers" and a malware profile named "Malware-AppServers."

The CGO that was terminated has the following properties:

SHA256: eb71ea69dd19f728ab9240565e8c7efb59821e19e3788e289301e1e74940c208

File path: C:\Windows\System32\cmd.exe

Digital Signer: Microsoft Corporation

How should the exception be created so that it is scoped as narrowly as possible to minimize the security gap?

Options:

A.

Create the exception via the alert itself, selecting the CGO hash, CGO signer, CGO process path, and applying the scope to the "Exceptions-AppServers" profile.

B.

Create a Disable Prevention Rule via Exceptions Configuration with the following selections:

C.

Create a Legacy Agent Exception via Exceptions Configuration with the following selections:

D.

Create the exception via the alert itself, selecting the CGO hash, CGO signer, CGO process path, and applying the scope to "Global."

Buy Now
Questions 15

An engineer needs to migrate Cortex XDR agents without internet connection from Cortex XSIAM tenant A to Cortex XSIAM tenant B. There is a broker configured for each tenant. This is the communication flow:

XDR agents <-> Broker A <-> XSIAM tenant A

XDR agents <-> Broker B <-> XSIAM tenant B

Which two steps should be taken before moving the agents? (Choose two.)

Options:

A.

Install a new Broker C on site B, and register it into Cortex XSIAM tenant A.

B.

Install a new Broker C on site and register it into Cortex XSIAM tenant B.

C.

Also register Broker A to Cortex XSIAM tenant B.

D.

Select all endpoints in the console and add a new Broker C as proxy.

Buy Now
Questions 16

An application which ingests custom application logs is hosted in an on-premises virtual environment on an Ubuntu server, and it logs locally to a .csv file.

Which set of actions will allow the ingestion of the .csv logs into Cortex XSIAM directly from the server?

An application which ingests custom application logs is hosted in an on-premises virtual environment on an Ubuntu server, and it logs locally to a .csv file.

Which set of actions will allow the ingestion of the .csv logs into Cortex XSIAM directly from the server?

Options:

A.

Install a Broker VM in the environment, and configure the CSV Collector to collect the files of interest.

B.

Install a Cortex XDR agent on the Ubuntu server, and configure the agent to collect the files of interest.

C.

Install a Broker VM in the environment, and migrate the application to the Broker VM.

D.

Install XDR Collector on the Ubuntu server, and configure the agent to collect the files of interest.

Buy Now
Questions 17

How must Cloud Identity Engine be deployed and activated on Cortex XSIAM?

Options:

A.

In a different region than Cortex XSIAM; logs can be verified using pan_dss_raw dataset

B.

In a different region than Cortex XSIAM; logs can be verified using endpoints dataset

C.

In the same region as Cortex XSIAM; logs can be verified using pan_dss_raw dataset

D.

In the same region as Cortex XSIAM; logs can be verified using endpoints dataset

Buy Now
Exam Code: XSIAM-Engineer
Exam Name: Palo Alto Networks XSIAM Engineer
Last Update: Oct 8, 2025
Questions: 59
$66  $164.99
$50  $124.99
$42  $104.99
buy now XSIAM-Engineer