When the Security Phishing Email record is created what types of observables are stored in the record?
(Choose three.)
Which one of the following reasons best describes why roles for Security Incident Response (SIR) begin with "sn_si"?
When a service desk agent uses the Create Security Incident UI action from a regular incident, what occurs?
This type of integration workflow helps retrieve a list of active network connections from a host or endpoint, so it can be used to enrich incidents during investigation.
David is on the Network team and has been assigned a security incident response task. What role does he need to be able to view and work the task?