A cybersecurity analyst inspects DNS logs on a regular basis to identify possible IOCs that are not triggered by known signatures. The analyst reviews the following log snippet:
Which of the following should the analyst do next based on the information reviewed?
Janet
8 months agoJolanda
8 months agoArleen
8 months agoTresa
7 months agoIlene
7 months agoLeeann
8 months agoGarry
8 months agoVilma
8 months agoJunita
8 months agoJoanna
8 months agoMing
8 months ago