New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Palo Alto Networks XDR-Analyst Exam - Topic 1 Question 2 Discussion

Actual exam question for Palo Alto Networks's XDR-Analyst exam
Question #: 2
Topic #: 1
[All XDR-Analyst Questions]

As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to open a malicious Word document. You learn from the WildFire report and AutoFocus that this document is known to have been used in Phishing campaigns since 2018. What steps can you take to ensure that the same document is not opened by other users in your organization protected by the Cortex XDR agent?

Show Suggested Answer Hide Answer
Suggested Answer: B

The correct answer is B, create Behavioral Threat Protection (BTP) rules to recognize and prevent the activity. BTP rules are a powerful feature of Cortex XDR that allow you to define custom rules to detect and block malicious behaviors on endpoints. You can use BTP rules to create indicators of compromise (IOCs) based on file attributes, registry keys, processes, network connections, and other criteria. By creating BTP rules, you can prevent the same malicious Word document from being opened by other users in your organization, even if the document has a different name or hash value. BTP rules are updated through content updates and can be managed from the Cortex XDR console.

The other options are incorrect for the following reasons:

A is incorrect because enabling DLL Protection on all endpoints is not a specific or effective way to prevent the malicious Word document. DLL Protection is a feature of Cortex XDR that prevents the loading of unsigned or untrusted DLLs by protected processes. However, this feature does not apply to Word documents or macros, and may cause false positives or compatibility issues with legitimate applications.

C is incorrect because relying on Cortex to share IOCs with the Cyber Threat Alliance members is not a proactive or sufficient way to prevent the malicious Word document. The Cyber Threat Alliance is a group of cybersecurity vendors that share threat intelligence and best practices to improve their products and services. However, not all vendors are members of the alliance, and not all IOCs are shared or updated in a timely manner. Therefore, you cannot assume that other users in your organization are protected by the same IOCs as Cortex XDR.

D is incorrect because doing nothing is not a responsible or secure way to prevent the malicious Word document. Even though Cortex XDR agent prevented the attempt to open the document on one endpoint, it does not mean that the document is no longer a threat. The document may still be circulating in your network or email system, and may be opened by other users who have different agent profiles or policies. Therefore, you should take steps to identify and block the document across your organization.


Cortex XDR Agent Administrator Guide: Behavioral Threat Protection

Cortex XDR Agent Administrator Guide: DLL Protection

Palo Alto Networks: Cyber Threat Alliance

Contribute your Thoughts:

0/2000 characters
Orville
6 days ago
C) is wishful thinking. Gotta take action to protect your own organization, can't just rely on others.
upvoted 0 times
...
Otis
11 days ago
A) might work, but who wants to deal with false positives? Not this gal.
upvoted 0 times
...
Melvin
16 days ago
Haha, I bet the malware analyst is having a field day with this one. Gotta love those phishing campaigns!
upvoted 0 times
...
Denae
21 days ago
D) is incorrect. Just because the malicious document was stopped once doesn't mean it won't be attempted again.
upvoted 0 times
...
Blossom
26 days ago
B) is the correct answer. Creating BTP rules to recognize and prevent the activity is the best way to ensure the same document is not opened by other users.
upvoted 0 times
...
Angelica
1 month ago
I think if the document is already stopped, we might not need to take further action, but it feels risky to assume that.
upvoted 0 times
...
Renea
1 month ago
I recall a practice question where we discussed sharing IOCs, but I’m not convinced that’s enough on its own.
upvoted 0 times
...
Rodrigo
1 month ago
I think I'd go with option B. Creating those BTP rules sounds like the best way to proactively detect and prevent this known threat from impacting our users. Gotta stay one step ahead of the bad guys!
upvoted 0 times
...
Maryanne
2 months ago
Ooh, I like the idea of leveraging the Cyber Threat Alliance to share IOCs. That could be a really efficient way to get the word out and protect other organizations too. Option C seems promising.
upvoted 0 times
...
Francis
2 months ago
Hmm, I'm not sure about enabling DLL protection on all endpoints. That could cause some issues with false positives. I'd want to be careful with that approach.
upvoted 0 times
...
Mitsue
2 months ago
I'm a bit confused - if the document is already stopped, do we really need to take any additional steps? Option D seems like it could be the easiest solution.
upvoted 0 times
...
Sharita
2 months ago
I'm not entirely sure, but I feel like creating Behavioral Threat Protection rules could be a proactive step to prevent similar issues.
upvoted 0 times
...
Cathern
2 months ago
I think enabling DLL Protection could help, but I remember there were concerns about false positives in some cases.
upvoted 0 times
...
Germaine
2 months ago
I think I'd go with option B. Creating BTP rules to recognize and prevent the activity seems like the best way to proactively protect against this known threat.
upvoted 0 times
...

Save Cancel