Question 31

A customer wants to modify the retention periods of their Threat logs in Cortex Data Lake.
Where would the user configure the ratio of storage for each log type?
  • Question 32

    What is a benefit offered by Cortex XSOAR?
  • Question 33

    Which attack method is a result of techniques designed to gain access through vulnerabilities in the code of an operating system (OS) or application?
  • Question 34

    The prospect is deciding whether to go with a phishing or a ServiceNow use case as part of their POC We have integrations for both but a playbook for phishing only Which use case should be used for the POC?
  • Question 35

    What does Cortex Xpanse ingest from XDR endpoints?