I'm feeling pretty confident on this one. I think the key is understanding that Advanced Threat Protection is looking for anomalous behavior, not just authorized changes. So option B about the SELECT * attempt is probably the right answer.
Based on the options, it seems like it would detect a user attempting to access data they shouldn't have, like trying to SELECT all records from a table. That seems like the kind of suspicious activity it's designed to catch.
I'm a bit confused on the specifics here. Does it matter if the user is authorized to make those changes, or is it just the volume of activity that triggers the detection?
Quick action seems like it could be a good option here. That would allow the user to quickly delete the phone number with a single click when the DoNotCall box is checked.
I'm just going to pick the option that sounds the most ominous - 'Advanced Threat Protection' makes me think they're looking for some real shady stuff, so I'll go with B.
Malcolm
3 months agoCristina
3 months agoBo
3 months agoSharen
4 months agoJoseph
4 months agoHermila
4 months agoRaul
4 months agoChrista
4 months agoMozelle
5 months agoBuck
5 months agoMeghan
5 months agoLindsey
5 months agoKeshia
5 months agoVivan
5 months agoMarkus
5 months agoRosalind
10 months agoRory
10 months agoNoemi
8 months agoDortha
8 months agoTalia
8 months agoIn
10 months agoHoa
9 months agoCaitlin
9 months agoTyra
10 months agoZack
10 months agoFatima
9 months agoMitsue
9 months agoLeslie
9 months agoNohemi
10 months agoCherelle
9 months agoSue
10 months agoAn
10 months agoRessie
10 months agoKimbery
11 months agoCharlena
11 months agoKimbery
11 months ago