01. Why is threat intelligence most valuable during incident analysis, rather than initial alert generation?
a) It automates remediation actions
b) It replaces behavioral analytics
c) It eliminates false positives
d) It provides adversary context and historical relevance
02. A SOC wants to improve investigation efficiency after onboarding Cortex Cloud. Which two outcomes most directly indicate success?
(Choose 2)
a) Lower log ingestion volume
b) Faster investigations
c) Reduced need for analysts
d) Automatic remediation of all alerts
e) Consistent visibility across environments
03. During a security review, a SOC discovers that several cloud services are not sending telemetry to Cortex Cloud. Detection accuracy is lower than expected. What is the most significant risk created by this situation?
a) Detection blind spots
b) Increased storage costs
c) Reduced dashboard performance
d) Compliance violations
04. A security team wants to reduce application risk before deployment by enforcing preventive controls in the development lifecycle. Which two application security practices best support this goal?
(Choose 2)
a) Cloud Detection and Response
b) Infrastructure as Code (IaC) security
c) Network traffic inspection
d) Secrets scanning/
e) Runtime workload protection
05. WAAS begins blocking legitimate API requests after new protection rules are enabled. The application team reports business impact. What is the most appropriate corrective action?
a) Ignore the issue until a security incident occurs
b) Disable WAAS entirely
c) Tune WAAS rules using observed traffic patterns
d) Roll back application changes
06. Which two data sources are most valuable for detecting cloud workload compromise in Cortex Cloud?
(Choose 2)
a) DNS cache
b) Firewall logs
c) Endpoint telemetry
d) Marketing analytics
e) Application source code
07. Following a cloud security incident, a SOC conducts a post-incident review and identifies gaps in both detection logic and response coordination. Which two outcomes should a professional SOC expect from an effective post-incident review process?
(Choose 2)
a) Refined response workflows and escalation paths
b) Automatic compliance certification
c) Improved detection rules and tuning
d) Reduced need for SOC analysts
e) Immediate elimination of future incidents
08. An analyst receives an alert but cannot determine which business service is affected or how critical the impacted asset is. Which Cortex Cloud capability is missing in this scenario?
a) Detection use cases
b) Automation rules
c) Threat intelligence feeds
d) Asset inventory and context
09. A SOC is investigating a suspected cloud workload compromise and needs to understand attacker behavior over time. Which two Cortex Cloud capabilities are most critical for supporting this investigation?
(Choose 2)
a) Endpoint patch management
b) Automatic threat blocking
c) Correlation of multi-source telemetry
d) Network routing analysis
e) Long-term log retention
10. A cloud posture platform flags AI model storage locations that are accessible beyond intended teams. Which AI-SPM risk does this most directly represent?
a) Model performance degradation
b) Training data leakage
c) Runtime inference attacks
d) Model drift