Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

PSE-Cortex-Pro-24 Palo Alto Networks Systems Engineer Professional - Cortex Questions and Answers

Questions 4

Which playbook functionality allows grouping of tasks to create functional building blocks?

Options:

A.

playbook features

B.

sub-playbooks

C.

conditional tasks

D.

manual tasks

Buy Now
Questions 5

What is the difference between an exception and an exclusion?

Options:

A.

An exception is based on rules and exclusions are on alerts

B.

An exclusion is based on rules and exceptions are based on alerts.

C.

An exception does not exist

D.

An exclusion does not exist

Buy Now
Questions 6

The prospect is deciding whether to go with a phishing or a ServiceNow use case as part of their POC We have integrations for both but a playbook for phishing only Which use case should be used for the POC?

Options:

A.

phishing

B.

either

C.

ServiceNow

D.

neither

Buy Now
Questions 7

What are two ways Cortex XSIAM monitors for issues with data ingestion? (Choose two.)

Options:

A.

The Data Ingestion Health page identifies deviations from normal patterns of log collection

B.

The Cortex XSIAM Command Center dashboard will display a red icon if a data source is having issues.

C.

The tenant’s compute units consumption will change dramatically, indicating a collection issue.

D.

It automatically runs a copilot playbook to troubleshoot and resolve ingestion issues.

Buy Now
Questions 8

A Cortex XSOAR customer has a phishing use case in which a playbook has been implemented with one of the steps blocking a malicious URL found in an email reported by one of the users.

What would be the appropriate next step in the playbook?

Options:

A.

Email the CISO to advise that malicious email was found.

B.

Disable the user's email account.

C.

Email the user to confirm the reported email was phishing.

D.

Change the user's password.

Buy Now
Questions 9

Which statement applies to the differentiation of Cortex XDR from security information and event management (SIEM)?

Options:

A.

SIEM has access to raw logs from agents, where Cortex XDR traditionally only gets alerts.

B.

Cortex XDR allows just logging into the console and out of the box the events were blocked as a proactive approach.

C.

Cortex XDR requires a large and diverse team of analysts and up to several weeks for simple actions like creating an alert.

D.

SIEM has been entirely designed and built as cloud-native, with the ability to stitch together cloud logs, on-premises logs, third-party logs, and endpoint logs.

Buy Now
Questions 10

Which feature in Cortex XSIAM extends analytics detections to all mapped network and authentication data?

Options:

A.

Threat feed integration

B.

Automation daybooks

C.

Parsing rules

D.

Data models

Buy Now
Questions 11

The Cortex XDR management service requires which other Palo Alto Networks product?

Options:

A.

Directory Sync

B.

Cortex Data Lake

C.

Panorama

D.

Cortex XSOAR

Buy Now
Questions 12

In Cortex XDR Prevent, which three matching criteria can be used to dynamically group endpoints? (Choose three.)

Options:

A.

Domain/workgroup membership

B.

quarantine status

C.

hostname

D.

OS

E.

attack threat intelligence tag

Buy Now
Questions 13

Which method is used for third-party network data consumption?

Options:

A.

scripts library from the action center

B.

Open Database Connectivity (ODBC) connection to network device database

C.

Common Event Format (CEF) via broker Syslog module

D.

file reader to the /var/log/messages file on the device

Buy Now
Questions 14

Where is the best place to find official resource material?

Options:

A.

Online forums

B.

Video series

C.

Administrator's guide

D.

Technical blogs

Buy Now
Questions 15

Which three Demisto incident type features can be customized under Settings > Advanced > Incident Types? (Choose three.)

Options:

A.

Define whether a playbook runs automatically when an incident type is encountered

B.

Set reminders for an incident SLA

C.

Add new fields to an incident type

D.

Define the way that incidents of a specific type are displayed in the system

E.

Drop new incidents of the same type that contain similar information

Buy Now
Questions 16

What method does the Traps agent use to identify malware during a scheduled scan?

Options:

A.

Heuristic analysis

B.

Local analysis

C.

Signature comparison

D.

WildFire hash comparison and dynamic analysis

Buy Now
Questions 17

A Cortex XSIAM customer is unable to access their Cortex XSIAM tenant.

Which resource can the customer use to validate the uptime of Cortex XSIAM?

Options:

A.

Administrator Guide

B.

LIVEcommunity

C.

Release Notes

D.

Palo Alto Networks Status Page

Buy Now
Questions 18

During the TMS instance activation, a tenant (Customer) provides the following information for the fields in the Activation - Step 2 of 2 window.

PSE-Cortex-Pro-24 Question 18

During the service instance provisioning which three DNS host names are created? (Choose three.)

Options:

A.

cc-xnet50.traps.paloaltonetworks.com

B.

hc-xnet50.traps.paloaltonetworks.com

C.

cc-xnet.traps.paloaltonetworks.com

D.

cc.xnet50traps.paloaltonetworks.com

E.

xnettraps.paloaltonetworks.com

F.

ch-xnet.traps.paloaltonetworks.com

Buy Now
Questions 19

Which two methods does the Cortex XDR agent use to identify malware during a scheduled scan? (Choose two.)

Options:

A.

WildFire hash comparison

B.

heuristic analysis

C.

signature comparison

D.

dynamic analysis

Buy Now
Questions 20

Given the exception thrown in the accompanying image by the Demisto REST API integration, which action would most likely solve the problem?

PSE-Cortex-Pro-24 Question 20

Which two playbook functionalities allow looping through a group of tasks during playbook execution? (Choose two.)

Options:

A.

Generic Polling Automation Playbook

B.

Playbook Tasks

C.

Sub-Play books

D.

Playbook Functions

Buy Now
Questions 21

Cortex XSOAR has extracted a malicious Internet Protocol (IP) address involved in command-and-control (C2) traffic.

What is the best method to block this IP from communicating with endpoints without requiring a configuration change on the firewall?

Options:

A.

Have XSOAR automatically add the IP address to a threat intelligence management (TIM) malicious IP list to elevate priority of future alerts.

B.

Have XSOAR automatically add the IP address to a deny rule in the firewall.

C.

Have XSOAR automatically add the IP address to an external dynamic list (EDL) used by the firewall.

D.

Have XSOAR automatically create a NetOps ticket requesting a configuration change to the firewall to block the IP.

Buy Now
Questions 22

Which statement applies to the malware protection flow in Cortex XDR Prevent?

Options:

A.

Local static analysis happens before a WildFire verdict check.

B.

In the final step, the block list is verified.

C.

A trusted signed file is exempt from local static analysis.

D.

Hash comparisons come after local static analysis.

Buy Now
Questions 23

Which two filter operators are available in Cortex XDR? (Choose two.)

Options:

A.

< >

B.

Contains

C.

=

D.

Is Contained By

Buy Now
Questions 24

Which two Cortex XSOAR incident type features can be customized under Settings > Advanced > Incident Types? (Choose two.)

Options:

A.

adding new fields to an incident type

B.

setting reminders for an incident service level agreement

C.

defining whether a playbook runs automatically when an incident type is encountered

D.

dropping new incidents of the same type that contain similar information

Buy Now
Questions 25

Which two filter operators are available in Cortex XDR? (Choose two.)

Options:

A.

not Contains

B.

!*

C.

=>

D.

< >

Buy Now
Questions 26

Which source provides data for Cortex XDR?

Options:

A.

VMware NSX

B.

Amazon Alexa rank indicator

C.

Cisco ACI

D.

Linux endpoints

Buy Now
Questions 27

Given the integration configuration and error in the screenshot what is the cause of the problem?

PSE-Cortex-Pro-24 Question 27

Options:

A.

incorrect instance name

B.

incorrect Username and Password

C.

incorrect appliance port

D.

incorrect server URL

Buy Now
Questions 28

Which integration allows data to be pushed from Cortex XSOAR into Splunk?

Options:

A.

ArcSight ESM integration

B.

SplunkUpdate integration

C.

Demisto App for Splunk integration

D.

SplunkPY integration

Buy Now
Questions 29

What is the difference between the intel feed’s license quotas of Cortex XSOAR Starter Edition and Cortex XSOAR (SOAR + TIM)?

Options:

A.

Cortex XSOAR Started Edition has unlimited access to the Threat Intel Library.

B.

In Cortex XSOAR (SOAR + TIM), Unit 42 Intelligence is not included.

C.

In Cortex XSOAR (SOAR + TIM), intelligence detail view and relationships data are not included.

D.

Cortex XSOAR Starter Edition includes up to 5 active feeds and 100 indicators/fetch.

Buy Now
Questions 30

Which two troubleshooting steps should be taken when an integration is failing to connect? (Choose two.)

Options:

A.

Ensure the playbook is set to run in quiet mode to minimize CPU usage and suppress errors

B.

Confirm the integration credentials or API keys are valid.

C.

Check the integration logs and enable a higher logging level, if needed, view the specific error.

D.

Confirm there are no dashboards or reports configured to use that integration instance.

Buy Now
Questions 31

What is a requirement when integrating Cortex XSIAM or Cortex XDR with other Palo Alto Networks products?

Options:

A.

Advanced logging service license

B.

HTTP Collector

C.

Devices in the same region as XDR/XSIAM

D.

XDR/XSIAM Broker VM

Buy Now
Questions 32

Cortex XDR external data ingestion processes ingest data from which sources?

Options:

A.

windows event logs only

B.

syslogs only

C.

windows event logs, syslogs, and custom external sources

D.

windows event logs and syslogs only

Buy Now
Questions 33

A customer has purchased Cortex XSOAR and has a need to rapidly stand up the product in their environment. The customer has stated that their internal staff are currently occupied with other projects.

Which Palo Alto Networks service offering should be recommended to the customer?

Options:

A.

Deployment

B.

Onboardinq

C.

Fast-Track

D.

QuickStart

Buy Now
Questions 34

What should be configured for a Cortex XSIAM customer who wants to automate the response to certain alerts?

Options:

A.

Playbook triggers

B.

Correlation rules

C.

Incident scoring

D.

Data model rules

Buy Now
Questions 35

If an anomalous process is discovered while investigating the cause of a security event, you can take immediate action to terminate the process or the whole process tree, and block processes from running by initiating which Cortex XDR capability?

Options:

A.

Live Sensors

B.

File Explorer

C.

Log Stitching

D.

Live Terminal

Buy Now
Questions 36

Which action should be performed by every Cortex Xpanse proof of value (POV)?

Options:

A.

Grant the customer access to the management console immediately following activation.

B.

Provide the customer with an export of all findings at the conclusion of the POV.

C.

Enable all of the attach surface rules to show the highest number of alerts.

D.

Review the mapping in advance to identity a few interesting findings to share with the customer.

Buy Now
Questions 37

Where is the output of the task visible when a playbook task errors out?

Options:

A.

playbook editor

B.

XSOAR audit log

C.

/var/log/messages

D.

War Room of the incident

Buy Now
Questions 38

When preparing for a Cortex XSOAR proof of value (POV), which task should be performed before the evaluation is requested?

Options:

A.

Ensuring that the customer has single sign-on (SSO) configured in their environment

B.

Building out an executive-IeveI proposal detailing the product capabilities

C.

Planning for every different use case the customer has for the solution

D.

Gathering a list of the different integrations that will need to be configured

Buy Now
Questions 39

What is the primary purpose of Cortex XSIAM’s machine learning led design?

Options:

A.

To group alerts into incidents for manual analysis

B.

To facilitate alert and log management without automation

C.

To effectively handle the bulk of incidents through automation

D.

To rely heavily on human-driven detection and remediation

Buy Now
Questions 40

In Cortex XDR Prevent, which three matching criteria can be used to dynamically group endpoints? (Choose three )

Options:

A.

alert root cause

B.

hostname

C.

domain/workgroup membership

D.

OS

E.

presence of Flash executable

Buy Now
Questions 41

Which option is required to prepare the VDI Golden Image?

Options:

A.

Configure the Golden Image as a persistent VDI

B.

Use the Cortex XDR VDI tool to obtain verdicts for all PE files

C.

Install the Cortex XOR Agent on the local machine

D.

Run the Cortex VDI conversion tool

Buy Now
Questions 42

When preparing the golden image in a Cortex XDR Virtual Desktop Infrastructure (VDI) deployment, which step is required?

Options:

A.

Disable automatic memory dumps.

B.

Scan the image using the imagepreptool.

C.

Launch the VDI conversion tool.

D.

Enable the VDI license timeout.

Buy Now
Questions 43

Which integration allows searching and displaying Splunk results within Cortex XSOAR?

Options:

A.

SplunkPY integration

B.

Demisto App for Splunk integration

C.

XSOAR REST API integration

D.

Splunk integration

Buy Now
Questions 44

"Bob" is a Demisto user. Which command is used to add 'Bob" to an investigation from the War Room CLI?

Options:

A.

#Bob

B.

/invite Bob

C.

@Bob

D.

!invite Bob

Buy Now
Questions 45

Which statement best describes the benefits of the combination of Prisma Cloud, Cortex Xpanse, and partner services?

Options:

A.

It achieves comprehensive multi-cloud visibility and security

B It optimizes network performance in multi-cloud environments

B.

It enhances on-premises security measures

C.

It streamlines the cloud migration processes

Buy Now
Questions 46

On a multi-tenanted v6.2 Cortex XSOAR server, which path leads to the server.log for "Tenant1"?

Options:

A.

/var/log/demisto/acc_Tenant1/server.log

B.

/var/log/demisto/Tenant1/server.log

C.

/var/lib/demisto/acc_Tenant1/server.log

D.

/var/lib/demisto/server.log

Buy Now
Questions 47

Which attack method is a result of techniques designed to gain access through vulnerabilities in the code of an operating system (OS) or application?

Options:

A.

exploit

B.

malware

C.

phishing

D.

ransomware

Buy Now
Questions 48

What is a benefit offered by Cortex XSOAR?

Options:

A.

It provides advanced customization capabilities.

B.

It provides real-time protection across hosts and containers.

C.

It enables consolidation of multiple point products into a single integrated service.

D.

It enables a comprehensive view of the customer environment with regard to digital employee productivity.

Buy Now
Questions 49

A test for a Microsoft exploit has been planned. After some research Internet Explorer 11 CVE-2016-0189 has been selected and a module in Metasploit has been identified

(exploit/windows/browser/ms16_051_vbscript)

The description and current configuration of the exploit are as follows;

PSE-Cortex-Pro-24 Question 49

What is the remaining configuration?

A)

PSE-Cortex-Pro-24 Question 49

B)

PSE-Cortex-Pro-24 Question 49

C)

PSE-Cortex-Pro-24 Question 49

D)

PSE-Cortex-Pro-24 Question 49

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 50

Which two items are stitched to the Cortex XDR causality chain'' (Choose two)

Options:

A.

firewall alert

B.

SIEM alert

C.

full URL

D.

registry set value

Buy Now
Exam Code: PSE-Cortex-Pro-24
Exam Name: Palo Alto Networks Systems Engineer Professional - Cortex
Last Update: Aug 6, 2025
Questions: 168

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now PSE-Cortex-Pro-24 testing engine

PDF (Q&A)

$36.75  $104.99
buy now PSE-Cortex-Pro-24 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 18 Aug 2025