New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Palo Alto Networks PCDRA Exam - Topic 1 Question 78 Discussion

Actual exam question for Palo Alto Networks's PCDRA exam
Question #: 78
Topic #: 1
[All PCDRA Questions]

As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to download Cobalt Strike on one of your servers. Days later, you learn about a massive ongoing supply chain attack. Using Cortex XDR you recognize that your server was compromised by the attack and that Cortex XDR prevented it. What steps can you take to ensure that the same protection is extended to all your servers?

Show Suggested Answer Hide Answer
Suggested Answer: A

To ensure that the same protection is extended to all your servers, you need to create Behavioral Threat Protection (BTP) rules to recognize and prevent the activity. BTP is a feature of Cortex XDR that allows you to create custom rules that detect and block malicious or suspicious behaviors on your endpoints, such as file execution, process injection, network connection, or registry modification. BTP rules can use various operators, functions, and variables to define the criteria and the actions for the rules.By creating BTP rules that match the behaviors of the supply chain attack, you can prevent the attack from compromising your servers12.

Let's briefly discuss the other options to provide a comprehensive explanation:

B) Enable DLL Protection on all servers but there might be some false positives: This is not the correct answer. Enabling DLL Protection on all servers will not ensure that the same protection is extended to all your servers. DLL Protection is a feature of Cortex XDR that allows you to block the execution of unsigned or untrusted DLL files on your endpoints. DLL Protection can help to prevent some types of attacks that use malicious DLL files, but it may not be effective against the supply chain attack that used a Trojanized DLL file that was digitally signed by a trusted vendor.DLL Protection may also cause some false positives, as it may block some legitimate DLL files that are unsigned or untrusted3.

C) Create IOCs of the malicious files you have found to prevent their execution: This is not the correct answer. Creating IOCs of the malicious files you have found will not ensure that the same protection is extended to all your servers. IOCs are indicators of compromise that you can create to detect and respond to known threats on your endpoints, such as file hashes, registry keys, IP addresses, domain names, or full paths. IOCs can help to identify and block the malicious files that you have already discovered, but they may not be effective against the supply chain attack that used different variants of the malicious files with different hashes or names.IOCs may also become outdated, as the attackers may change or update their files to evade detection4.

D) Enable Behavioral Threat Protection (BTP) with cytool to prevent the attack from spreading: This is not the correct answer. Enabling BTP with cytool will not ensure that the same protection is extended to all your servers. BTP is a feature of Cortex XDR that allows you to create custom rules that detect and block malicious or suspicious behaviors on your endpoints, such as file execution, process injection, network connection, or registry modification. BTP rules can help to prevent the attack from spreading, but they need to be created and configured in the Cortex XDR app, not with cytool. Cytool is a command-line tool that allows you to perform various operations on the Cortex XDR agent, such as installing, uninstalling, upgrading, or troubleshooting. Cytool does not have an option to enable or configure BTP rules.

In conclusion, to ensure that the same protection is extended to all your servers, you need to create BTP rules to recognize and prevent the activity. By using BTP rules, you can create custom and flexible prevention rules that match the behaviors of the supply chain attack.


Behavioral Threat Protection

Create a BTP Rule

DLL Protection

Create an IOC Rule

[Cytool]

Contribute your Thoughts:

0/2000 characters
Jolene
2 months ago
Surprised Cortex XDR caught it before! Can it really prevent all attacks?
upvoted 0 times
...
Martha
2 months ago
I think enabling DLL Protection could lead to too many false alarms.
upvoted 0 times
...
Laurel
3 months ago
Creating IOCs is a solid move to block those files.
upvoted 0 times
...
Kimberlie
3 months ago
Enabling BTP with cytool sounds like the best option here.
upvoted 0 times
...
Paola
3 months ago
Definitely BTP rules are a must!
upvoted 0 times
...
Eden
3 months ago
Enabling BTP with cytool sounds familiar. I feel like we practiced a similar question where that was the recommended step to contain an attack.
upvoted 0 times
...
Kristofer
4 months ago
I think creating IOCs for the malicious files could be effective, but I wonder if that alone is enough to cover all potential threats.
upvoted 0 times
...
Boris
4 months ago
I'm not entirely sure about enabling DLL Protection. I think it could lead to false positives, which might disrupt normal operations.
upvoted 0 times
...
Arlyne
4 months ago
I remember we discussed the importance of creating BTP rules in our last study session. It seems like a solid approach to prevent similar attacks.
upvoted 0 times
...
Val
4 months ago
Enabling Behavioral Threat Protection (BTP) with cytool sounds promising. That could help prevent the attack from spreading across our infrastructure. I'll have to look into that option more closely.
upvoted 0 times
...
Shelia
4 months ago
Creating IOCs of the malicious files seems like a good idea, but I'm not sure if that would be enough to fully protect against this type of supply chain attack. We need a more comprehensive solution.
upvoted 0 times
...
Flo
5 months ago
Hmm, I'm a bit unsure about the DLL Protection option. While it might help, the potential for false positives could cause more problems than it solves. I'd want to be really careful with that approach.
upvoted 0 times
...
Joni
5 months ago
I think the best approach here is to create Behavioral Threat Protection (BTP) rules to recognize and prevent the activity. That way, we can proactively protect all our servers, not just the one that was compromised.
upvoted 0 times
...

Save Cancel