B) Transform flow? Is this a trick question or something? Ingestion Rule is the only option that makes sense. I'm not falling for any of these other choices.
I think the correct answer is A) Ingestion Rule. That's the most logical choice for triggering a Security Incident when a record is created in the Phishing Email table.
Cordelia
9 months agoTelma
9 months agoDominga
9 months agoMicah
9 months agoRutha
9 months agoLacresha
9 months agoFranchesca
9 months agoYan
10 months agoFabiola
8 months agoClare
8 months agoRosendo
8 months agoChrista
8 months agoMelda
10 months agoGwenn
10 months agoBernardo
10 months agoVivienne
9 months agoHeike
10 months agoGayla
10 months agoRaylene
10 months agoValentin
10 months agoCarlota
9 months agoErnestine
9 months agoElroy
9 months agoCandra
10 months ago