An analyst has been tasked with providing a report that can be used to prioritise investigations based on a user's Attack Index score. Which report would be most suitable for this purpose?
As a security analyst, you need to update the TAP URL Defense Custom Blocklist. Which three entries are valid formats for the blocklist? (Select three.)
In which part of the SMTP conversation can threat actors spoof information to make the message look safe to the recipient?
As a new analyst, you need to review threat intelligence related to threats in your environment. Which Proofpoint product provides this data?
What does a notification of “Cleared” mean when shown in the header of an individual threat tab?
For which two reasons should organizations customize their incident response plans based on NIST SP 800-61 or another incident response standard? (Select two.)
Refer to the exhibit.

How many messages were sent to a mailbox configured to bypass quarantine for monitoring purposes?
Which two items should be included in an incident report to be discussed during a post-incident debrief? (Select two.)
Which filter category in the TAP Dashboard helps identify threats targeting VIPs or specific geographies?