A security analyst is investigating a malware incident at a company The malware is accessing a command-and-control website at www.comptia.com. All outbound internet traffic is logged to a syslog server and stored in /logfiles/messages Which of the following commands would be best for the analyst to use on the syslog server to search for recent traffic to the command-and-control website?
Johna
7 months agoAlpha
7 months agoDustin
7 months agoFausto
7 months agoAlpha
7 months agoJohna
7 months ago