Which two types of content can be installed or upgraded through a Cortex XSIAM content pack? (Choose two.)
In Cortex XSOAR, what happens by default to an indicator (such as a malicious IP) once it reaches its configured expiration date?
A company has a highly segmented network where the Cortex XSOAR server cannot directly communicate with an on-premises mail server. Which component should be deployed in the mail server's segment to facilitate integration?
Which Cortex XDR component raises an alert when suspicious activity composed of multiple events is detected and deviates from established baseline behavior?
In which scenario would an organization benefit from Cortex XDR compared to an EDR solution?
A customer is investigating a security incident in which unusual network traffic is observed and a malicious process is identified on an endpoint. Which Cortex XDR capability assists with correlating firewall network logs and endpoint data in this environment?
When writing a custom XQL query to hunt for specific network anomalies, which part of the query syntax is used to define the specific table or source of data being searched?
Where can an administrator begin to grant a new non-SSO user access to a Cortex XDR tenant? (Choose one answer)
Which metric is used by SOC management to measure the average "Dwell Time"—the duration between a successful compromise and the moment it is first identified by a security tool or analyst?
Where is the data retrieved by an integration task (such as a user's email address or a file's reputation) stored within an incident so that other playbook tasks can access it?
Which action should an administrator take to create automated response actions when a user account is compromised? (Choose one answer)
Which two types of tasks are supported in Cortex XSIAM playbooks? (Choose two answers)