New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Palo Alto Networks XSIAM-Analyst Exam - Topic 3 Question 3 Discussion

Actual exam question for Palo Alto Networks's XSIAM-Analyst exam
Question #: 3
Topic #: 3
[All XSIAM-Analyst Questions]

SCENARIO:

A security analyst has been assigned a ticket from the help desk stating that users are experiencing errors when attempting to open files on a specific network share. These errors state that the file format cannot be opened. IT has verified that the file server is online and functioning, but that all files have unusual extensions attached to them.

The security analyst reviews alerts within Cortex XSIAM and identifies malicious activity related to a possible ransomware attack on the file server. This incident is then escalated to the incident response team for further investigation.

Upon reviewing the incident, the responders confirm that ransomware was successfully executed on the file server. Other details of the attack are noted below:

* An unpatched vulnerability on an externally facing web server was exploited for initial access

* The attackers successfully used Mimikatz to dump sensitive credentials that were used for privilege escalation

* PowerShell was used on a Windows server for additional discovery, as well as lateral movement to other systems

* The attackers executed SystemBC RAT on multiple systems to maintain remote access

* Ransomware payload was downloaded on the file server via an external site "file io"

QUESTION STATEMENT:

Which forensics artifact collected by Cortex XSIAM will help the responders identify what the attackers were looking for during the discovery phase of the attack?

Show Suggested Answer Hide Answer
Suggested Answer: D

The correct answer is D -- Shell history.

The Shell history artifact provides a detailed record of commands executed during interactive shell sessions (such as via PowerShell or command prompt) on Windows and Linux systems. Reviewing this artifact enables responders to reconstruct the attacker's activity during the discovery phase, showing exactly what directories, files, and commands were accessed or run, and what the attackers were searching for.

'The Shell history artifact allows responders to see what commands were executed during the attack, providing insight into attacker intent and discovery activities.'

Document Reference: XSIAM Analyst ILT Lab Guide.pdf

Page: Page 46 (Incident Handling section, Causality and Forensics)


Contribute your Thoughts:

0/2000 characters
Linn
1 day ago
Not so sure, User access logging could also reveal suspicious behavior.
upvoted 0 times
...
Lettie
6 days ago
Definitely agree, Shell history is key for discovery insights!
upvoted 0 times
...
Avery
12 days ago
I think Shell history would show what commands were run.
upvoted 0 times
...
Melissa
17 days ago
Wait, they used Mimikatz to dump credentials? That's like the cybersecurity equivalent of using the Force to steal your neighbor's wallet.
upvoted 0 times
...
Pura
22 days ago
Hmm, I wonder if the attackers were looking for the latest cat memes on "file io"...
upvoted 0 times
...
Fabiola
27 days ago
C) User access logging might provide some useful context, but it's probably not the most specific artifact for identifying the attackers' discovery activities.
upvoted 0 times
...
Iluminada
1 month ago
A) PSReadline is interesting, but it's more focused on PowerShell command history, which doesn't seem as directly relevant to the discovery phase.
upvoted 0 times
...
Tamesha
1 month ago
PSReadline seems less likely, but I guess it could provide some context on command usage. I wish I had practiced more with these specific artifacts.
upvoted 0 times
...
Howard
1 month ago
I feel like WordWheelQuery could be relevant too, but I can't recall how it specifically ties into the discovery phase.
upvoted 0 times
...
Jerry
2 months ago
I'm not entirely sure, but I remember something about User access logging being useful for tracking user activity.
upvoted 0 times
...
Virgina
2 months ago
I think the answer might be Shell history since it could show what commands the attackers were running during their discovery phase.
upvoted 0 times
...
Cheryl
2 months ago
I feel pretty confident about this one. The details about the attackers using PowerShell for discovery and lateral movement suggest that the shell history would be the best forensics artifact to review. That should give the responders insight into the specific commands and activities the attackers were performing.
upvoted 0 times
...
Tayna
2 months ago
I think it's D) Shell history.
upvoted 0 times
...
Titus
2 months ago
D) Shell history could also be useful in identifying the attackers' actions during the discovery phase.
upvoted 0 times
...
Beth
2 months ago
B) WordWheelQuery seems like the most relevant option here, as it would likely capture the attackers' search and discovery activities.
upvoted 0 times
...
Audra
3 months ago
Wait, they used PowerShell? That's wild!
upvoted 0 times
...
Joesph
3 months ago
Okay, let's think this through step-by-step. The question is asking about the discovery phase, so I'd want to look at artifacts that could reveal what the attackers were searching for or investigating on the compromised systems. The shell history seems like the most relevant option here.
upvoted 0 times
...
Tora
3 months ago
Hmm, I'm a little unsure about this one. There are a lot of technical details to consider. I might start by reviewing the information about the initial access vector and how the attackers escalated privileges. That could help point me towards the right forensics artifact to look at.
upvoted 0 times
...
Alyce
3 months ago
This seems like a pretty straightforward incident response question. I'd focus on the details provided about the attacker's tactics, like using Mimikatz and PowerShell for discovery. The shell history artifact could give us insight into what commands they were running during that phase.
upvoted 0 times
...

Save Cancel