Refer to the exhibit.

Which two determinations can be made by the data shown on the TAP Dashboard in the exhibit? (Select two.)
Why do some domains generate a warning when they are added to the custom blocklist in TAP?
An analyst is reviewing the Notable Senders section in Proofpoint Supplier Threat Protection.

Based on the data shown in the exhibit, which vendor’s email activity should be investigated first?
What is the primary function of the People Page in the Threat Protection Workbench and TAP Dashboard?
An analyst is reviewing the Threats page in the TAP Dashboard.

Which of the top four threats seen in the exhibit should be prioritised for investigation?
Which two factors make Business Email Compromise (BEC) attacks difficult to detect? (Select two.)
As a security analyst, you need to update the TAP URL Defense Custom Blocklist. Which three entries are valid formats for the blocklist? (Select three.)
What happens when a user clicks a rewritten URL that TAP URL Defense has determined to be malicious?