B) Transform flow? Is this a trick question or something? Ingestion Rule is the only option that makes sense. I'm not falling for any of these other choices.
I think the correct answer is A) Ingestion Rule. That's the most logical choice for triggering a Security Incident when a record is created in the Phishing Email table.
Cordelia
7 months agoTelma
6 months agoDominga
6 months agoMicah
6 months agoRutha
6 months agoLacresha
6 months agoFranchesca
6 months agoYan
7 months agoFabiola
6 months agoClare
6 months agoRosendo
6 months agoChrista
6 months agoMelda
7 months agoGwenn
7 months agoBernardo
7 months agoVivienne
7 months agoHeike
7 months agoGayla
7 months agoRaylene
7 months agoValentin
7 months agoCarlota
6 months agoErnestine
7 months agoElroy
7 months agoCandra
7 months ago