Which two playbook functionalities allow looping through a group of tasks during playbook execution? (Choose two.)
Cortex XSOAR has extracted a malicious Internet Protocol (IP) address involved in command-and-control (C2) traffic.
What is the best method to block this IP from communicating with endpoints without requiring a configuration change on the firewall?
Which integration allows searching and displaying Splunk results within Cortex XSOAR?
Which two types of indicators of compromise (IOCs) are available for creation in Cortex XDR? (Choose two.)
A Cortex XSOAR customer has a phishing use case in which a playbook has been implemented with one of the steps blocking a malicious URL found in an email reported by one of the users.
What would be the appropriate next step in the playbook?