A cybersecurity analyst inspects DNS logs on a regular basis to identify possible IOCs that are not triggered by known signatures. The analyst reviews the following log snippet:
Which of the following should the analyst do next based on the information reviewed?
Janet
9 months agoJolanda
10 months agoArleen
10 months agoTresa
9 months agoIlene
9 months agoLeeann
9 months agoGarry
9 months agoVilma
9 months agoJunita
9 months agoJoanna
9 months agoMing
10 months ago