When the Security Phishing Email record is created what types of observables are stored in the record?
(Choose three.)
This type of integration workflow helps retrieve a list of active network connections from a host or endpoint, so it can be used to enrich incidents during investigation.
When a service desk agent uses the Create Security Incident UI action from a regular incident, what occurs?
Knowledge articles that describe steps an analyst needs to follow to complete Security incident tasks might be associated to those tasks through which of the following?
What is calculated as an arithmetic mean taking into consideration different values in the CI, Security Incident, and User records?
Select the one capability that retrieves a list of running processes on a CI from a host or endpoint.
Which of the following tag classifications are provided baseline? (Choose three.)
Which Table would be commonly used for Security Incident Response?