What is the standard installation disk space recommended to install a Broker VM?
A. 2GB disk space
B. 1GB disk space
C. 512GB disk space
D. 256GB disk space
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 2:
As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to download Cobalt Strike on one of your servers. Days later, you learn about a massive ongoing supply chain attack. Using Cortex XDR you recognize that your server was compromised by the attack and that Cortex XDR prevented it. What steps can you take to ensure that the same protection is extended to all your servers?
A. Create Behavioral Threat Protection (BTP) rules to recognize and prevent the activity.
B. Create IOCs of the malicious files you have found to prevent their execution.
C. Enable Behavioral Threat Protection (BTP) with cytool to prevent the attack from spreading.
D. Enable DLL Protection on all servers but there might be some false positives.
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 3:
Which of the following best defines the Windows Registry as used by the Cortex XDR agent?
A. a hierarchical database that stores settings for the operating system and for applications
B. a central system, available via the internet, for registering officially licensed versions of software to prove ownership
C. a system of files used by the operating system to commit memory that exceeds the available hardware resources. Also known as the "swap"
D. a ledger for maintaining accurate and up-to-date information on total disk usage and disk space remaining available to the operating system
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 4:
How does Cortex XDR agent for Windows prevent ransomware attacks from compromising the file system?
A. by encrypting the disk first.
B. by retrieving the encryption key.
C. by utilizing decoy Files.
D. by patching vulnerable applications.
正解:C
解説: (Pass4Test メンバーにのみ表示されます)
質問 5:
What is the purpose of targeting software vendors in a supply-chain attack?
A. to access source code.
B. to take advantage of a trusted software delivery method.
C. to steal users' login credentials.
D. to report Zero-day vulnerabilities.
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
Yamano -
内容すごく素晴らしかった。そしてPCDRA試験にも合格だ。