A cybersecurity analyst inspects DNS logs on a regular basis to identify possible IOCs that are not triggered by known signatures. The analyst reviews the following log snippet:
Which of the following should the analyst do next based on the information reviewed?
Janet
1 years agoJolanda
1 years agoArleen
1 years agoTresa
11 months agoIlene
12 months agoLeeann
12 months agoGarry
12 months agoVilma
12 months agoJunita
12 months agoJoanna
12 months agoMing
1 years ago