B) Transform flow? Is this a trick question or something? Ingestion Rule is the only option that makes sense. I'm not falling for any of these other choices.
I think the correct answer is A) Ingestion Rule. That's the most logical choice for triggering a Security Incident when a record is created in the Phishing Email table.
Cordelia
6 months agoTelma
6 months agoDominga
6 months agoMicah
6 months agoRutha
6 months agoLacresha
6 months agoFranchesca
6 months agoYan
7 months agoFabiola
5 months agoClare
5 months agoRosendo
5 months agoChrista
5 months agoMelda
7 months agoGwenn
7 months agoBernardo
7 months agoVivienne
6 months agoHeike
7 months agoGayla
7 months agoRaylene
7 months agoValentin
7 months agoCarlota
6 months agoErnestine
6 months agoElroy
6 months agoCandra
7 months ago