B, C are correct
To investigate and respond to security events on endpoints, you can use the Live Terminal to initiate a remote connection to an endpoint.
With flexible XQL search, you can unearth almost any threat using a broad set of search commands and options. XQL search allows you to find adversary tactics across the attack lifecycle and hunt down stealthy attack behaviors by constructing laser-precise queries. You can also search for indicators of compromise (IoCs) in your data to reveal malicious activity that might otherwise be virtually impossible to find
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
garcem
9 months, 2 weeks ago5688ac9
9 months, 3 weeks agoTeachTrooper
11 months ago