Weekend Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

XSIAM-Engineer Palo Alto Networks XSIAM Engineer Questions and Answers

Questions 4

In the Incident War Room, which command is used to update incident fields identified in the incident layout?

Options:

A.

!setIncidentFields

B.

!setParentIncidentFields

C.

!setParentIncidentContext

D.

!updateParentIncidentFields

Buy Now
Questions 5

A Cortex XDR agent is installed on an endpoint, but the agent is unable to download content updates and has not registered with the Cortex XSIAM server. An engineer troubleshoots the network connection and determines that, by design, this endpoint does not have direct internet access to the required network destinations for the Cortex XDR agent traffic.

A Broker VM that has the local agent settings applet enabled with Agent Proxy configured is reachable by the endpoint. The Broker VM details are as follows:

FQDN: crtxbroker01.company.net

Proxy listening port: 8888

How should the engineer configure the Cortex XDR agent to use the existing Broker VM as a proxy for the agent network traffic?

Options:

A.

cytool proxy set "crtxbroker01. company.net: 8888"

B.

cytool config proxy --host crtxbroker01.company.net --port 8888

C.

cytool set proxy --host crtxbroker01.company.net --port 8888

D.

cytool proxy config "crtxbroker01.company.net:8888"

Buy Now
Questions 6

Which option should be used when customizing a dashboard in Cortex XSIAM to include a widget that will display data filtered by more than one dynamic value?

Options:

A.

Free text/number

B.

Multi-select

C.

Fixed filter

D.

Single-select

Buy Now
Questions 7

An application which ingests custom application logs is hosted in an on-premises virtual environment on an Ubuntu server, and it logs locally to a .csv file.

Which set of actions will allow the ingestion of the .csv logs into Cortex XSIAM directly from the server?

An application which ingests custom application logs is hosted in an on-premises virtual environment on an Ubuntu server, and it logs locally to a .csv file.

Which set of actions will allow the ingestion of the .csv logs into Cortex XSIAM directly from the server?

Options:

A.

Install a Broker VM in the environment, and configure the CSV Collector to collect the files of interest.

B.

Install a Cortex XDR agent on the Ubuntu server, and configure the agent to collect the files of interest.

C.

Install a Broker VM in the environment, and migrate the application to the Broker VM.

D.

Install XDR Collector on the Ubuntu server, and configure the agent to collect the files of interest.

Buy Now
Questions 8

Cortex XSIAM has not received any logs for 30 minutes from a Palo Alto Networks NGFW named "MainFW.” An engineer wants to create an alert for this scenario.

Correlation rule settings include:

XSIAM-Engineer Question 8Time Schedule: Every 30 minutes

XSIAM-Engineer Question 8Query Timeframe: 30 minutes

XSIAM-Engineer Question 8Action: Generate alert

XSIAM-Engineer Question 8Alert Name: No logs received from MainFW in the past 30 minutes

Which query should be used in the correlation rule?

A)

XSIAM-Engineer Question 8

B)

XSIAM-Engineer Question 8

C)

XSIAM-Engineer Question 8

D)

XSIAM-Engineer Question 8

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 9

A vulnerability analyst asks a Cortex XSIAM engineer to identify assets vulnerable to newly reported zero-day CVE affecting the "ai_app" application and versions 12.1, 12.2, 12.4, and 12.5.

Which XQL query will provide the required result?

A)

XSIAM-Engineer Question 9

B)

XSIAM-Engineer Question 9

C)

XSIAM-Engineer Question 9

D)

XSIAM-Engineer Question 9

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 10

What is the purpose of using rolling tokens to manage Cortex XDR agents?

Options:

A.

To periodically rotate encryption keys used for tenant communication

B.

To perform administration on agents without requiring static credentials

C.

To authorize agents to download and install content updates

D To temporarily disable the agents during maintenance windows

Buy Now
Questions 11

A Cortex XSIAM engineer is implementing role-based access control (RBAC) and scope-based access control (SBAC) for users accessing the Cortex XSIAM tenant with the following requirements:

Users managing machines in Europe should be able to manage and control all endpoints and installations, create profiles and policies, view alerts, and initiate Live Terminal, but only for endpoints in the Europe region.

Users managing machines in Europe should not be able to create, modify, or delete new or existing user roles.

The Europe region endpoints are identified by both of the following:

Endpoint Tag = "Europe-Servers" and Endpoint Group = "Europe" for servers in Europe

Endpoint Group = "Europe" and Endpoint Tag = "Europe-Workstation" for workstations in Europe

Which two sets of implementation actions should the engineer take? (Choose two.)

Options:

A.

Verify and confirm that SBAC mode under "Server Settings" is set to "Restrictive," and assign "EG:Europe" under the user permission scope configuration.

B.

Use the pre-defined roles, assign the "Instance Administrator" role to the user or user group managing Europe-based endpoints.

C.

Verify and confirm that SBAC mode under "Server Settings" is set to "Permissive," and assign "EG:Europe" under the user permission scope configuration.

D.

Use the pre-defined roles, assign the "Privileged IT Admin" role to the user or user group managing Europe-based endpoints.

Buy Now
Questions 12

Administrators from Building 3 have been added to Cortex XSIAM to perform limited functions on a subset of endpoints. Custom roles have been created and applied to the administrators to limit their permissions, but their access should also be constrained through the principle of least privilege according to the endpoints they are allowed to manage. All endpoints are part of an endpoint group named "Building3," and some endpoints may also be members of other endpoint groups.

Which technical control will restrict the ability of the administrators to manage endpoints outside of their area of responsibility, while maintaining visibility to Building 3's endpoints?

Options:

A.

SBAC enabled in Building 3's IP range with the "EG:Building3" tag assigned to each administrator's scope

B.

SBAC enabled in Permissive Mode with the "EG:Building3" tag assigned to each administrator's scope

C.

SBAC enabled in Restrictive Mode with the "EG:Building3" tag assigned to each administrator's scope

D.

SBAC enabled globally with the "EG:Building3" tag assigned to each administrator's scope

Buy Now
Questions 13

A Behavioral Threat Protection (BTP) alert is triggered with an action of "Prevented (Blocked)" on one of several application servers running Windows Server 2022. The investigation determines the involved processes to be legitimate core OS binaries, and the description from the triggered BTP rule is an acceptable risk for the company to allow the same activity in the future.

This type of activity is only expected on the endpoints that are members of the endpoint group "AppServers," which already has a separate prevention policy rule with an exceptions profile named "Exceptions-AppServers" and a malware profile named "Malware-AppServers."

The CGO that was terminated has the following properties:

SHA256: eb71ea69dd19f728ab9240565e8c7efb59821e19e3788e289301e1e74940c208

File path: C:\Windows\System32\cmd.exe

Digital Signer: Microsoft Corporation

How should the exception be created so that it is scoped as narrowly as possible to minimize the security gap?

Options:

A.

Create the exception via the alert itself, selecting the CGO hash, CGO signer, CGO process path, and applying the scope to the "Exceptions-AppServers" profile.

B.

Create a Disable Prevention Rule via Exceptions Configuration with the following selections:

13

C.

Create a Legacy Agent Exception via Exceptions Configuration with the following selections:

13

D.

Create the exception via the alert itself, selecting the CGO hash, CGO signer, CGO process path, and applying the scope to "Global."

Buy Now
Questions 14

When a Cortex XSIAM playbook execution reaches a breakpoint on a non-manual task, which two actions will allow the playbook to continue? (Choose two.)

Options:

A.

Disable the breakpoint and rerun the playbook from the start.

B.

Skip the task with the breakpoint to let the playbook proceed automatically.

C.

Wait for all parallel tasks to be completed before the breakpoint task resumes automatically.

D.

Click Run Script Now or Complete Manually.

Buy Now
Questions 15

Which types of content may be included in a Marketplace content pack?

Options:

A.

Integrations, playbooks, parsers, and server configuration keys

B.

Predefined dashboards, indicators, and reports

C.

Scripts, playbooks, integrations, and correlation rules

D.

Behavioral indicator of compromise (BIOC) rules, layouts, and custom dashboards

Buy Now
Questions 16

Which cytool command will look up the policy being applied to a Cortex XDR agent?

Options:

A.

cytool adaptive_policy interval 0

B.

cytool payload_execution query

C.

cytool adaptive_policy recalc

D.

cytool persist print agent_settings.db

Buy Now
Questions 17

An engineer wants to onboard data from a third-party vendor’s firewall. There is no content pack available for it, so the engineer creates custom data source integration and parsing rules to generate a dataset with the firewall data.

How can the analytics capabilities of Cortex XSIAM be used on the data?

Options:

A.

Create a behavioral indicator of compromise (BIOC) rule on the network fields (source IP, source port, target IP, target port. IP protocol).

B.

Create a data model rule with network fields mapped (source IP. source port, target IP. target port. IP protocol).

C.

Create a correlation rule on the network fields (source IP. source port, target IP. target port. IP protocol).

D.

Create a parsing rule and ensure the network fields exist (source IP. source port, target IP. target port. IP protocol).

Buy Now
Exam Code: XSIAM-Engineer
Exam Name: Palo Alto Networks XSIAM Engineer
Last Update: Sep 20, 2025
Questions: 59

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now XSIAM-Engineer testing engine

PDF (Q&A)

$31.5  $104.99
buy now XSIAM-Engineer pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 21 Sep 2025