How to configure MFA policies to maximum number of abnormal logins challenged?

I have a few questions about how to maximize the chances an anomalous login will be challenged.

  1. How is the policy evaluated if multiple behaviors are assigned to a single rule? Is the rule matched if any behavior is matched? Or does it require all behaviors to be matched?
  2. How does the risk level setting interact with the Risk level, precisely?
    2.a. If Okta assigns a Risk level of “Medium” to a sign-on request, does that match a rule with “AND Risk is High"?
    2.b Vice-versa, if Okta assigns a Risk level of “Medium” to a sign-on request, does that match a rule with “AND Risk is Medium"?
  3. What is the best way to blend geo-location heuristics and risk-based heuristics for maximum protection?
    3.a. If we set a rule with a behavior detection (e.g. Velocity detection) and risk score “AND Risk is High", what happens if an incoming request exceeds the configured velocity but Okta scores it “Medium” risk?
    My reading of the docs, this login would not be challenged by this rule, is that accurate?
    3.b. Would separate rules for each desired behavior with “AND Risk is Any”, followed by a fall-through rule with no configured behavior but “Risk is High” match more incoming requests than setting the “Risk is High” on each rule?

I noticed a typo in 2.b and can’t seem to edit the post any longer.

2.b Vice-versa, if Okta assigns a Risk level of “Medium” to a sign-on request, does that match a rule with “AND Risk is Medium"?

This should say instead:

2.b Vice-versa, if Okta assigns a Risk level of “High” (not medium) to a sign-on request, does that match a rule with “AND Risk is Medium"?