New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Palo Alto Networks PCDRA Exam - Topic 14 Question 13 Discussion

Actual exam question for Palo Alto Networks's PCDRA exam
Question #: 13
Topic #: 14
[All PCDRA Questions]

Where can SHA256 hash values be used in Cortex XDR Malware Protection Profiles?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Chaya
4 months ago
Wait, are we sure about that? Sounds a bit off.
upvoted 0 times
...
Gregoria
4 months ago
I agree, it's crucial for allowed executables in Windows.
upvoted 0 times
...
Jeanice
4 months ago
No way, SHA256 can't be used in those profiles!
upvoted 0 times
...
Alberta
4 months ago
I think it's also used for macOS signers, right?
upvoted 0 times
...
Nina
4 months ago
Definitely in the Windows Malware Protection Profile for executables!
upvoted 0 times
...
Pamella
5 months ago
I'm leaning towards option D for Windows, but I also have a nagging feeling that option C might be correct since I can't recall seeing hashes used in profiles at all.
upvoted 0 times
...
Jaime
5 months ago
I feel like I saw a practice question about SHA256 in relation to Linux, but I can't quite remember the details about Java libraries.
upvoted 0 times
...
Fredric
5 months ago
I recall something about allowed signers in macOS, but I'm not sure if it was SHA256 hashes or something different.
upvoted 0 times
...
Avery
5 months ago
I think SHA256 hashes are definitely used in the Windows profile, but I can't remember if it's specifically for executables or something else.
upvoted 0 times
...
Iraida
5 months ago
Hmm, I'm not too familiar with the different features of vRealize Suite Lifecycle Manager. I'll need to review the documentation to make sure I understand the differences between the options.
upvoted 0 times
...
Carlee
5 months ago
I'm not too familiar with the Azure ML designer, but based on the details provided, I think option A, creating a batch inference pipeline, is the way to go. The key is that the pipeline needs to run on a schedule to handle the large volume of files.
upvoted 0 times
...
Millie
5 months ago
I've got a good feeling about this one. The in-band methods are straightforward, and I'm pretty sure I know the right out-of-band options too. Time to put my SIP knowledge to the test!
upvoted 0 times
...
Dewitt
5 months ago
Public accessibility seems like an important factor, but I'm not sure if that's the "major" consideration from a business standpoint. I'll need to weigh the pros and cons of the different options to determine which one is truly the most significant.
upvoted 0 times
...
Elouise
5 months ago
I recall that teaching in different environments is important for generalization, so "D" doesn't seem to fit the concept we studied.
upvoted 0 times
...

Save Cancel