Which Cortex XDR Analytics alert would likely be triggered by an adversary trying to communicate with malware in your network?

Prepare for the PSE Cortex Professional Test with interactive quizzes, multiple choice questions with hints, and thorough explanations. Enhance your knowledge and get ready to ace your exam!

The alert related to malware is the most relevant in this scenario because it specifically pertains to the detection of known malicious code or activities associated with malware. When an adversary attempts to communicate with malware within a network, it often involves behaviors that can be classified under the category of malware alerts. These alerts are designed to identify and flag suspicious activities, such as the presence of executable files that exhibit malicious characteristics or attempt to establish communication with command and control servers.

In the context of cyber threats, malware alerts are crucial as they can encompass a broad range of malicious activities, including but not limited to unauthorized data exfiltration, system compromise, or command execution. Therefore, if an adversary is trying to interact with malware already present in the network, it is highly likely that the Cortex XDR system will generate a malware alert to reflect the incoming threat.

The other options, while they may represent security concerns, do not directly signal the specific action of an adversary communicating with malware. Uncommon Local Scheduled Task Creation might indicate unusual behavior but is more associated with legitimate task scheduling that is being manipulated. New Administrative Behavior could suggest unwanted privilege escalation, and DNS Tunneling would indicate data exfiltration via DNS queries, which might indirectly relate to malware but isn't

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy