You are given an MD5 hash of a file suspected to be malware by your security incident response team. They ask you to offer insight into who has encountered this file and from where was the threat initiated. In which two Skope IT events tables would you search to find the answers to these questions? (Choose two.)
Felicidad
28 days agoJacquelyne
10 days agoMalissa
12 days agoCarmen
14 days agoParis
23 days agoAaron
1 months agoIluminada
24 days agoEzekiel
26 days agoLatonia
1 months agoKeena
2 months agoChauncey
2 months agoIndia
1 months agoPage
1 months agoShanda
2 months agoMelynda
1 months agoHubert
1 months agoBeckie
1 months agoRuby
2 months agoGilma
2 months ago