Which of the following actions will store a compressed, secure version of an email attachment with suspected malware for future analysis?
Which app allows a user to send Splunk Enterprise Security notable events to Phantom?
How is it possible to evaluate user prompt results?
Which of the following is the complete list of the types of backups that are supported by Phantom?
Which of the following can the format block be used for?
What metrics can be seen from the System Health Display? (select all that apply)
When configuring a Splunk asset for Phantom to connect to a SplunkC loud instance, the user discovers that they need to be able to run two different on_poll searches. How is this possible
When working with complex data paths, which operator is used to access a sub-element inside another element?
Which of the following is a reason to create a new role in SOAR?
Which of the following views provides a holistic view of an incident - providing event metadata, Service Level Agreement status, Severity, sensitivity of an event, and other detailed event info?