You are given an MD5 hash of a file suspected to be malware by your security incident response team. They ask you to offer insight into who has encountered this file and from where was the threat initiated.
In which two Scope IT events tables would you search to find the answers to these questions? (Choose two.)
zacc96
3 months, 4 weeks agosh_ravan
7 months, 4 weeks agoBigMikeGoldFish
8 months, 2 weeks agonsciipotato
8 months, 2 weeks ago