You are given an MD5 hash of a file suspected to be malware by your security incident response team. They ask you to offer insight into who has encountered this file and from where was the threat initiated. In which two Skope IT events tables would you search to find the answers to these questions? (Choose two.)
Felicidad
2 months agoJacquelyne
1 months agoMalissa
1 months agoCarmen
1 months agoParis
2 months agoAaron
2 months agoIluminada
2 months agoEzekiel
2 months agoLatonia
2 months agoKeena
3 months agoChauncey
3 months agoIndia
2 months agoPage
2 months agoShanda
3 months agoMelynda
2 months agoHubert
2 months agoBeckie
2 months agoRuby
3 months agoGilma
3 months ago