B) Transform flow? Is this a trick question or something? Ingestion Rule is the only option that makes sense. I'm not falling for any of these other choices.
I think the correct answer is A) Ingestion Rule. That's the most logical choice for triggering a Security Incident when a record is created in the Phishing Email table.
Cordelia
3 months agoTelma
2 months agoDominga
2 months agoMicah
2 months agoRutha
3 months agoLacresha
3 months agoFranchesca
3 months agoYan
3 months agoFabiola
2 months agoClare
2 months agoRosendo
2 months agoChrista
2 months agoMelda
3 months agoGwenn
4 months agoBernardo
4 months agoVivienne
3 months agoHeike
3 months agoGayla
3 months agoRaylene
4 months agoValentin
4 months agoCarlota
3 months agoErnestine
3 months agoElroy
3 months agoCandra
4 months ago