You are given an MD5 hash of a file suspected to be malware by your security incident response team. They ask you to offer insight into who has encountered this file and from where was the threat initiated. In which two Skope IT events tables would you search to find the answers to these questions? (Choose two.)
Jeanice
3 months agoCarla
3 months agoThurman
3 months agoLashon
4 months agoAn
4 months agoFranchesca
4 months agoIlda
4 months agoEmerson
4 months agoViola
5 months agoEmmanuel
5 months agoJustine
5 months agoWenona
5 months agoShaun
5 months agoFrancis
5 months agoFelicidad
1 year agoJacquelyne
1 year agoMalissa
1 year agoCarmen
1 year agoParis
1 year agoAaron
1 year agoIluminada
1 year agoEzekiel
1 year agoLatonia
1 year agoKeena
1 year agoChauncey
1 year agoIndia
1 year agoPage
1 year agoShanda
1 year agoMelynda
1 year agoHubert
1 year agoBeckie
1 year agoRuby
1 year agoGilma
1 year ago