B) Transform flow? Is this a trick question or something? Ingestion Rule is the only option that makes sense. I'm not falling for any of these other choices.
I think the correct answer is A) Ingestion Rule. That's the most logical choice for triggering a Security Incident when a record is created in the Phishing Email table.
Cordelia
8 months agoTelma
8 months agoDominga
8 months agoMicah
8 months agoRutha
8 months agoLacresha
8 months agoFranchesca
8 months agoYan
9 months agoFabiola
7 months agoClare
7 months agoRosendo
7 months agoChrista
7 months agoMelda
9 months agoGwenn
9 months agoBernardo
9 months agoVivienne
8 months agoHeike
9 months agoGayla
9 months agoRaylene
9 months agoValentin
9 months agoCarlota
8 months agoErnestine
8 months agoElroy
8 months agoCandra
9 months ago