An analyst is reviewing the Notable Senders section in Proofpoint Supplier Threat Protection.

Based on the data shown in the exhibit, which vendor’s email activity should be investigated first?
Why do some domains generate a warning when they are added to the custom blocklist in TAP?
Evidence of an attack is no longer present due to a scheduled data purge. What would be the appropriate recommendation?