An Incident Responder has reviewed a STIX report and now wants to ensure that their systems have NOT been compromised by any of the reported threats.
Which two objects in the STIX report will ATP search against? (Choose two.)
SHA-256 hash
MD5 hash
MAC address
SHA-1 hash
Registry entry
Submit