I'm feeling pretty confident on this one. I think the key is understanding that Advanced Threat Protection is looking for anomalous behavior, not just authorized changes. So option B about the SELECT * attempt is probably the right answer.
Based on the options, it seems like it would detect a user attempting to access data they shouldn't have, like trying to SELECT all records from a table. That seems like the kind of suspicious activity it's designed to catch.
I'm a bit confused on the specifics here. Does it matter if the user is authorized to make those changes, or is it just the volume of activity that triggers the detection?
Quick action seems like it could be a good option here. That would allow the user to quickly delete the phone number with a single click when the DoNotCall box is checked.
I'm just going to pick the option that sounds the most ominous - 'Advanced Threat Protection' makes me think they're looking for some real shady stuff, so I'll go with B.
Malcolm
5 months agoCristina
5 months agoBo
5 months agoSharen
5 months agoJoseph
6 months agoHermila
6 months agoRaul
6 months agoChrista
6 months agoMozelle
6 months agoBuck
6 months agoMeghan
6 months agoLindsey
6 months agoKeshia
6 months agoVivan
7 months agoMarkus
7 months agoRosalind
11 months agoRory
11 months agoNoemi
10 months agoDortha
10 months agoTalia
10 months agoIn
12 months agoHoa
11 months agoCaitlin
11 months agoTyra
11 months agoZack
12 months agoFatima
10 months agoMitsue
11 months agoLeslie
11 months agoNohemi
12 months agoCherelle
11 months agoSue
11 months agoAn
11 months agoRessie
12 months agoKimbery
1 year agoCharlena
1 year agoKimbery
1 year ago