If you have an isolated network that is prevented from connecting to the Cortex Data Lake, which type of Broker VM setup can you use to facilitate the communication?
Which of the following protection modules is checked first in the Cortex XDR Windows agent malware protection flow?
How does Cortex XDR agent for Windows prevent ransomware attacks from compromising the file system?
Which two types of exception profiles you can create in Cortex XDR? (Choose two.)
A Linux endpoint with a Cortex XDR Pro perEndpoint license and Enhanced Endpoint Data enabled has reported malicious activity, resulting in the creation of a file that you wish to delete. Which action could you take to delete the file?
What license would be required for ingesting external logs from various vendors?
When investigating security events, which feature in Cortex XDR is useful for reverting the changes on the endpoint?