New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Palo Alto Networks PCDRA Exam - Topic 12 Question 45 Discussion

Actual exam question for Palo Alto Networks's PCDRA exam
Question #: 45
Topic #: 12
[All PCDRA Questions]

What kind of malware uses encryption, data theft, denial of service, and possibly harassment to take advantage of a victim?

Show Suggested Answer Hide Answer
Suggested Answer: B

To pivot within a row to Causality view and Timeline views for further investigation, you can use the Open Card and Open Timeline actions respectively. The Open Card action will open a new tab with the Causality view of the selected row, showing the causal chain of events that led to the alert. The Open Timeline action will open a new tab with the Timeline view of the selected row, showing the chronological sequence of events that occurred on the affected endpoint. These actions allow you to drill down into the details of each alert and understand the root cause and impact of the incident.Reference:

Cortex XDR User Guide, Chapter 9: Investigate Alerts, Section: Pivot to Causality View and Timeline View

PCDRA Study Guide, Section 3: Investigate and Respond to Alerts, Objective 3.1: Investigate alerts using the Causality view and Timeline view


Contribute your Thoughts:

0/2000 characters
Kallie
3 months ago
Keyloggers are sneaky, but they don’t encrypt files like ransomware.
upvoted 0 times
...
Celia
3 months ago
Wait, does ransomware really do harassment? Sounds extreme!
upvoted 0 times
...
Daisy
3 months ago
Ransomware is the right answer, no doubt about it.
upvoted 0 times
...
Rasheeda
4 months ago
I thought worms were the big threat these days?
upvoted 0 times
...
Shala
4 months ago
Definitely ransomware, it locks your files!
upvoted 0 times
...
Lachelle
4 months ago
I practiced a similar question, and I believe the answer is ransomware because it specifically targets victims for money through those methods.
upvoted 0 times
...
Josue
4 months ago
I’m a bit confused; I thought keyloggers were more about stealing information rather than using encryption.
upvoted 0 times
...
Ressie
4 months ago
I remember studying different types of malware, and I feel like ransomware fits the description best, especially with the harassment part.
upvoted 0 times
...
Pete
5 months ago
I think this might be ransomware since it involves encryption and data theft, but I'm not entirely sure.
upvoted 0 times
...
Gilberto
5 months ago
Based on the details provided, I think ransomware is the best fit. The use of encryption to hold data hostage, combined with data theft and denial of service, is a classic ransomware approach. I'll go with option A.
upvoted 0 times
...
Caren
5 months ago
I'm a bit confused on this one. The description mentions harassment, which doesn't seem to be a typical ransomware tactic. Maybe it's a different type of malware that I'm not as familiar with.
upvoted 0 times
...
Lashandra
5 months ago
Okay, let's see. Encryption, data theft, and denial of service - that sounds a lot like ransomware to me. I'm pretty confident that's the right answer.
upvoted 0 times
...
Maynard
5 months ago
Hmm, this one seems tricky. I'll need to think carefully about the key features of the different types of malware to determine which one best fits the description.
upvoted 0 times
...
Tresa
5 months ago
Hmm, this is a tough one. I'm torn between ransomware and rootkit. The harassment element makes me wonder if it could be a more advanced, multi-faceted attack. I'll have to weigh the options carefully before answering.
upvoted 0 times
...
Johnna
5 months ago
I think the answer is Session access controls, since the question specifically mentions requiring reauthentication every 8 hours.
upvoted 0 times
...
Dona
5 months ago
Hmm, this looks like a straightforward question about adding a user to an investigation in the Demisto War Room CLI. I think the answer is probably B, /invite Bob, since that seems like the most logical command to use.
upvoted 0 times
...
Moira
5 months ago
I feel like "Form Field Consistency Check" is more about input validation rather than restricting access. I'm leaning towards "URL Closure" for this one.
upvoted 0 times
...
Kaycee
9 months ago
I heard Ransomware is the new black. Gotta stay on trend, you know?
upvoted 0 times
...
Mira
9 months ago
Man, Ransomware is the answer for sure. It's like the Swiss Army Knife of malware, am I right?
upvoted 0 times
...
Ula
9 months ago
Easy peasy, Ransomware is the way to go. A no-brainer if you ask me.
upvoted 0 times
Paris
7 months ago
Rootkits are stealthy, but ransomware is more widespread.
upvoted 0 times
...
Marcos
8 months ago
D) Rootkit
upvoted 0 times
...
Kiera
8 months ago
Keyloggers can steal data, but ransomware is more destructive.
upvoted 0 times
...
Fletcher
8 months ago
C) Keylogger
upvoted 0 times
...
Arlene
8 months ago
No, not a worm. Ransomware is more dangerous.
upvoted 0 times
...
Maryann
8 months ago
B) Worm
upvoted 0 times
...
Gregg
8 months ago
Definitely! Ransomware is a major threat.
upvoted 0 times
...
Salome
8 months ago
A) Ransomware
upvoted 0 times
...
...
Shawnda
10 months ago
I'm going to have to go with Ransomware on this one. It's the only option that covers all the bases.
upvoted 0 times
Leonora
9 months ago
Definitely, you never know when you might encounter ransomware.
upvoted 0 times
...
Julieta
9 months ago
I think it's important to always be cautious of suspicious emails or links.
upvoted 0 times
...
King
9 months ago
I agree, it can really cause a lot of damage.
upvoted 0 times
...
Micah
9 months ago
Ransomware is a sneaky one, that's for sure.
upvoted 0 times
...
...
Hayley
10 months ago
Ransomware definitely sounds like the right choice here. All the symptoms match up perfectly.
upvoted 0 times
...
Dalene
10 months ago
I'm not sure, but I think it could also be D) Rootkit.
upvoted 0 times
...
Celia
10 months ago
I agree with Jeannine, ransomware fits the description.
upvoted 0 times
...
Jeannine
11 months ago
I think the answer is A) Ransomware.
upvoted 0 times
...
Ozell
11 months ago
I'm not sure, but I think it could also be D) Rootkit.
upvoted 0 times
...
Paz
11 months ago
I agree with Franklyn, ransomware fits the description.
upvoted 0 times
...
Franklyn
11 months ago
I think the answer is A) Ransomware.
upvoted 0 times
...

Save Cancel