You have run a suspicious file in a sandbox analysis tool to see what the file does. The analysis
report shows that outbound callouts were made post infection.
Which two pieces of information
from the analysis report are needed or required to investigate the callouts? (Choose two.)
A . file size
B . domain names
C . dropped files
D . signatures
E . host IP addresses
Answer: BE