An Incident Responder has reviewed a STIX report and now wants to ensure that their systems have NOT been compromised by any of the reported threats.
Which two objects in the STIX report will ATP search against? (Choose two.)
A. SHA-256 hash
B. MD5 hash
C. MAC address
D. SHA-1 hash
E. Registry entry