New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Palo Alto Networks PCDRA Exam - Topic 13 Question 56 Discussion

Actual exam question for Palo Alto Networks's PCDRA exam
Question #: 56
Topic #: 13
[All PCDRA Questions]

When investigating security events, which feature in Cortex XDR is useful for reverting the changes on the endpoint?

Show Suggested Answer Hide Answer
Suggested Answer: C

An example of an attack vector for ransomware is phishing emails containing malicious attachments. Phishing is a technique that involves sending fraudulent emails that appear to come from a legitimate source, such as a bank, a company, or a government agency. The emails typically contain a malicious attachment, such as a PDF document, a ZIP archive, or a Microsoft Office document, that contains ransomware or a ransomware downloader. When the recipient opens or downloads the attachment, the ransomware is executed and encrypts the files or data on the victim's system. The attacker then demands a ransom for the decryption key, usually in cryptocurrency.

Phishing emails are one of the most common and effective ways of delivering ransomware, as they can bypass security measures such as firewalls, antivirus software, or URL filtering. Phishing emails can also exploit the human factor, as they can trick the recipient into opening the attachment by using social engineering techniques, such as impersonating a trusted sender, creating a sense of urgency, or appealing to curiosity or greed. Phishing emails can also target specific individuals or organizations, such as executives, employees, or customers, in a technique called spear phishing, which increases the chances of success.

According to various sources, phishing emails are the main vector of ransomware attacks, accounting for more than 90% of all ransomware infections12.Some of the most notorious ransomware campaigns, such as CryptoLocker, Locky, and WannaCry, have used phishing emails as their primary delivery method3. Therefore, it is essential to educate users on how to recognize and avoid phishing emails, as well as to implement security solutions that can detect and block malicious attachments.Reference:

Top 7 Ransomware Attack Vectors & How to Avoid Becoming a Victim - Bitsight

What Is the Main Vector of Ransomware Attacks? A Definitive Guide

CryptoLocker Ransomware Information Guide and FAQ

[Locky Ransomware Information, Help Guide, and FAQ]

[WannaCry ransomware attack]


Contribute your Thoughts:

0/2000 characters
Virgie
3 months ago
Surprised that people are confused about this!
upvoted 0 times
...
Felicidad
3 months ago
I’m pretty sure Remediation Automation is the right answer.
upvoted 0 times
...
Man
3 months ago
Wait, is Machine Remediation even a thing?
upvoted 0 times
...
Veronika
4 months ago
Totally agree, Automatic Remediation is the way to go.
upvoted 0 times
...
Hoa
4 months ago
I think it's Automatic Remediation!
upvoted 0 times
...
Jenise
4 months ago
I’m leaning towards Remediation Suggestions, but I’m not confident. It seems like it would help, but does it actually revert changes?
upvoted 0 times
...
Lorrie
4 months ago
I feel like Machine Remediation could be the answer too, but it seems more focused on specific tasks rather than general changes.
upvoted 0 times
...
Leoma
4 months ago
I remember we discussed Remediation Automation in class, but I can't recall if that's the right term for reverting changes.
upvoted 0 times
...
Blair
5 months ago
I think the answer might be Automatic Remediation, but I'm not entirely sure. It sounds familiar from the practice questions.
upvoted 0 times
...
Freeman
5 months ago
I'm a bit confused by this question. I know Cortex XDR has some remediation features, but I'm not sure which one is specifically for reverting changes. I'll have to review my notes and try to narrow down the options.
upvoted 0 times
...
Janna
5 months ago
Ah, I think I've got it! Based on my understanding, the feature in Cortex XDR that's useful for reverting changes on the endpoint is Remediation Automation. I'm pretty confident that's the correct answer.
upvoted 0 times
...
Kerrie
5 months ago
Okay, let me see here. I remember learning about Cortex XDR's ability to revert changes on the endpoint, but I'm drawing a blank on the exact feature name. I'll try to eliminate the options that don't sound right.
upvoted 0 times
...
Veta
5 months ago
Hmm, I'm not entirely sure about this one. I know Cortex XDR has some remediation capabilities, but I can't recall the specific feature name. I'll have to think this through carefully.
upvoted 0 times
...
Lisha
5 months ago
This seems like a straightforward question about Cortex XDR features. I'm pretty confident I know the answer, but I'll double-check my notes just to be sure.
upvoted 0 times
...
Shawna
5 months ago
Ugh, this question is really throwing me off. I'm not sure if I should be focusing on network analysis, spatial analysis, or some combination of the two. I better review my notes and make sure I understand the different analysis techniques before attempting this.
upvoted 0 times
...
Jolene
5 months ago
Ah, I remember learning about this in class. I think I can solve this using a simple mathematical formula. Let me jot that down and see if it works.
upvoted 0 times
...
Clare
5 months ago
Hmm, I'm a bit unsure about this. I'll need to review the Oracle VM documentation to make sure I understand the right approach.
upvoted 0 times
...
Melissia
10 months ago
I'm just hoping the correct answer isn't 'Call the IT guy and cry'.
upvoted 0 times
...
Romana
10 months ago
Remediation Suggestions might be the way to go. I'd love some guidance on how to revert those changes, even if I have to do the work myself.
upvoted 0 times
Alonzo
9 months ago
C) Automatic Remediation
upvoted 0 times
...
Jamie
9 months ago
B) Machine Remediation
upvoted 0 times
...
Iraida
9 months ago
A) Remediation Automation
upvoted 0 times
...
...
Truman
10 months ago
Automatic Remediation would be my pick. Who doesn't love a little robot magic to clean up security messes?
upvoted 0 times
Karon
9 months ago
I prefer Remediation Suggestions, it gives me options to choose from when reverting changes on the endpoint.
upvoted 0 times
...
Georgiann
9 months ago
Remediation Automation is also a great feature to have for quickly addressing security events.
upvoted 0 times
...
Jade
9 months ago
I agree, Automatic Remediation is a lifesaver when it comes to reverting changes on the endpoint.
upvoted 0 times
...
...
Myra
10 months ago
Machine Remediation seems like a solid choice too. I wonder if it can automatically fix issues without me having to do everything manually.
upvoted 0 times
...
Chana
11 months ago
I'm not sure, but I think D) Remediation Suggestions could also be useful for identifying potential changes to revert.
upvoted 0 times
...
Velda
11 months ago
Hmm, I think Remediation Automation is the way to go. It sounds like it can really help undo the damage from security events.
upvoted 0 times
Cathern
10 months ago
Yes, it definitely helps in quickly undoing any damage caused by security events.
upvoted 0 times
...
Brynn
10 months ago
I agree, Remediation Automation is a great feature for reverting changes on the endpoint.
upvoted 0 times
...
...
Erick
11 months ago
I agree with Loren, because it can automatically revert changes on the endpoint.
upvoted 0 times
...
Loren
11 months ago
I think the answer is A) Remediation Automation.
upvoted 0 times
...

Save Cancel