Which of the following ES features would a security analyst use while investigating a network anomaly notable?
A . Correlation editor.
B . Key indicator search.
C . Threat download dashboard.
D . Protocol intelligence dashboard.
Answer: D
Explanation:
Reference: https://www.splunk.com/en_us/products/premium-solutions/splunk-enterprise-security/ features.html