If the customer’s email server currently has an account setup to report suspicious emails, then what happens next?
Which one of the following users is automatically added to the Request Assessments list?
Which of the following State Flows are provided for Security Incidents? (Choose three.)