Question 31
A customer wants to modify the retention periods of their Threat logs in Cortex Data Lake.
Where would the user configure the ratio of storage for each log type?
Where would the user configure the ratio of storage for each log type?
Question 32
What is a benefit offered by Cortex XSOAR?
Question 33
Which attack method is a result of techniques designed to gain access through vulnerabilities in the code of an operating system (OS) or application?
Question 34
The prospect is deciding whether to go with a phishing or a ServiceNow use case as part of their POC We have integrations for both but a playbook for phishing only Which use case should be used for the POC?
Question 35
What does Cortex Xpanse ingest from XDR endpoints?
