What can be used to triage and determine if an artifact in Cortex XDR is malicious? (Choose one answer)
Where is the data retrieved by an integration task (such as a user's email address or a file's reputation) stored within an incident so that other playbook tasks can access it?
Which dashboard or module in Cortex XSIAM provides visibility into unmanaged devices, unauthorized shadow IT, and cloud assets that do not currently have a Cortex agent installed?
Which task should a threat hunter include in the investigation when a Cortex XDR incident contains alerts about a malicious process?
How can an administrator run a Cortex XSOAR playbook regularly at a specific time and day of the week?
Which activities are facilitated through the War Room in Cortex XSOAR? (Choose one answer)
During which phase of the NIST Incident Response lifecycle does a SOC team conduct a "Lessons Learned" meeting to improve future response efforts?
Which scripting language would create a custom widget in Cortex XDR that shows the top five accounts with failed Windows logons in the past 24 hours?
How does the "Unit 42 Intel" integration directly assist a SOC analyst within the Cortex XDR or XSIAM Incident view?