New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Palo Alto Networks PCDRA Exam - Topic 11 Question 65 Discussion

Actual exam question for Palo Alto Networks's PCDRA exam
Question #: 65
Topic #: 11
[All PCDRA Questions]

Cortex XDR is deployed in the enterprise and you notice a cobalt strike attack via an ongoing supply chain compromise was prevented on 1 server. What steps can you take to ensure the same protection is extended to all your servers?

Show Suggested Answer Hide Answer
Suggested Answer: D

The best step to ensure the same protection is extended to all your servers is to create indicators of compromise (IOCs) of the malicious files you have found to prevent their execution. IOCs are pieces of information that indicate a potential threat or compromise on an endpoint, such as file hashes, IP addresses, domain names, or registry keys. You can create IOCs in Cortex XDR to block or alert on any file or network activity that matches the IOCs. By creating IOCs of the malicious files involved in the cobalt strike attack, you can prevent them from running or spreading on any of your servers.

The other options are not the best steps for the following reasons:

A is not the best step because conducting a thorough Endpoint Malware scan may not detect or prevent the cobalt strike attack if the malicious files are obfuscated, encrypted, or hidden. Endpoint Malware scan is a feature of Cortex XDR that allows you to scan endpoints for known malware and quarantine any malicious files found. However, Endpoint Malware scan may not be effective against unknown or advanced threats that use evasion techniques to avoid detection.

B is not the best step because enabling DLL Protection on all servers may cause some false positives and disrupt legitimate applications. DLL Protection is a feature of Cortex XDR that allows you to block or alert on any DLL loading activity that matches certain criteria, such as unsigned DLLs, DLLs loaded from network locations, or DLLs loaded by specific processes. However, DLL Protection may also block or alert on benign DLL loading activity that is part of normal system or application operations, resulting in false positives and performance issues.

C is not the best step because enabling Behavioral Threat Protection (BTP) with cytool may not prevent the attack from spreading if the malicious files are already on the endpoints or if the attack uses other methods to evade detection. Behavioral Threat Protection is a feature of Cortex XDR that allows you to block or alert on any endpoint behavior that matches certain patterns, such as ransomware, credential theft, or lateral movement. Cytool is a command-line tool that allows you to configure and manage the Cortex XDR agent on the endpoint. However, Behavioral Threat Protection may not prevent the attack from spreading if the malicious files are already on the endpoints or if the attack uses other methods to evade detection, such as encryption, obfuscation, or proxy servers.


Create IOCs

Scan an Endpoint for Malware

DLL Protection

Behavioral Threat Protection

Cytool for Windows

Contribute your Thoughts:

0/2000 characters
Lizette
3 months ago
Not sure if enabling DLL protection is enough, though.
upvoted 0 times
...
Raymon
3 months ago
Creating lOCs is a solid step, can't let those files run.
upvoted 0 times
...
Mable
3 months ago
Surprised that DLL protection could lead to false positives!
upvoted 0 times
...
Christiane
4 months ago
I think A is more effective for a thorough check.
upvoted 0 times
...
Carin
4 months ago
BTP is definitely a must for all servers!
upvoted 0 times
...
Audrie
4 months ago
Conducting a thorough Endpoint Malware scan seems like a solid approach, but I’m not sure if it would cover all potential vulnerabilities across the servers.
upvoted 0 times
...
Alexia
4 months ago
I feel like enabling DLL Protection is a good idea, but I recall some concerns about false positives affecting legitimate applications.
upvoted 0 times
...
Gilma
4 months ago
I think creating IOCs could be really effective, but I wonder if that alone would be enough to stop future attacks.
upvoted 0 times
...
Apolonia
5 months ago
I remember we discussed enabling Behavioral Threat Protection in class, but I'm not entirely sure if that's the best first step here.
upvoted 0 times
...
Jettie
5 months ago
I'm a bit confused on the best approach here. Should I go with the DLL protection option, or is that going to cause more trouble than it's worth? I want to make sure I'm not introducing any false positives that could disrupt operations.
upvoted 0 times
...
Virgilio
5 months ago
Okay, I've got this. The question is asking how to ensure the same protection is extended to all servers, so I'd say option D is the way to go. Creating IOCs of the malicious files will help prevent their execution across the entire environment.
upvoted 0 times
...
Darnell
5 months ago
Hmm, this is a tricky one. I'm not sure if a full endpoint malware scan is the best approach, since the attack was already detected and prevented on one server. Maybe focusing on the specific indicators of compromise would be more effective.
upvoted 0 times
...
Alpha
5 months ago
I think the key here is to extend the protection to all servers, so I'd go with option C to enable Behavioral Threat Protection. That should help prevent the attack from spreading.
upvoted 0 times
...
Xochitl
5 months ago
I'm pretty sure the core should prioritize redundancy and aggregation, making D sound plausible, but I keep getting mixed up between D and B!
upvoted 0 times
...
Janae
1 year ago
I'd say option C is the way to go. Behavioral Threat Protection with cytool? Sounds like a party! Just don't forget to bring the snacks and energy drinks, because this is gonna be an all-nighter.
upvoted 0 times
...
Tyisha
1 year ago
Option A? Seriously? Malware scans are so 2010. We need some real cybersecurity magic, like Cortex XDR. Let's put on our best wizard hats and make this attack disappear!
upvoted 0 times
Tony
1 year ago
D) Create IOCs of the malicious files you have found to prevent their execution.
upvoted 0 times
...
Noah
1 year ago
C) Enable Behavioral Threat Protection (BTP) with cytool to prevent the attack from spreading.
upvoted 0 times
...
Ernest
1 year ago
B) Enable DLL Protection on all servers but there might be some false positives.
upvoted 0 times
...
Lashawnda
1 year ago
A) Conduct a thorough Endpoint Malware scan.
upvoted 0 times
...
...
Clare
1 year ago
Option D sounds like a good idea, but I'm not sure how effective it will be in the long run. Might as well just unplug all the servers and call it a day. Less chance of getting hacked that way.
upvoted 0 times
Allene
1 year ago
Might as well just unplug all the servers and call it a day. Less chance of getting hacked that way.
upvoted 0 times
...
Carlota
1 year ago
Option D sounds like a good idea, but I'm not sure how effective it will be in the long run.
upvoted 0 times
...
...
Bette
1 year ago
I would say option B is the way to go. DLL Protection might have some false positives, but better safe than sorry, right? Gotta keep those servers locked down tight.
upvoted 0 times
Paz
1 year ago
Creating IOCs of the malicious files found is also important to prevent their execution.
upvoted 0 times
...
Samira
1 year ago
I think enabling Behavioral Threat Protection with cytool could also be helpful in preventing the attack from spreading.
upvoted 0 times
...
Kimbery
1 year ago
I agree, option B sounds like a good precaution to take.
upvoted 0 times
...
...
Keva
1 year ago
I think conducting a thorough Endpoint Malware scan is also important to ensure all servers are protected.
upvoted 0 times
...
Elly
1 year ago
I agree with An, but we should also create IOCs of the malicious files.
upvoted 0 times
...
Gianna
1 year ago
Definitely go with option C. Behavioral Threat Protection is the way to go to prevent the spread of the attack. Who needs sleep when you have cytool, am I right?
upvoted 0 times
Marti
1 year ago
Let's make sure all servers are protected with Behavioral Threat Protection.
upvoted 0 times
...
Chara
1 year ago
Cytool is a powerful tool to have in your arsenal for security.
upvoted 0 times
...
Carry
1 year ago
I agree, option C is the best choice to prevent the attack from spreading.
upvoted 0 times
...
...
An
1 year ago
I think we should enable Behavioral Threat Protection (BTP) with cytool.
upvoted 0 times
...

Save Cancel