A security analyst is investigating a malware incident at a company The malware is accessing a command-and-control website at www.comptia.com. All outbound internet traffic is logged to a syslog server and stored in /logfiles/messages Which of the following commands would be best for the analyst to use on the syslog server to search for recent traffic to the command-and-control website?
Johna
4 months agoAlpha
4 months agoDustin
4 months agoFausto
4 months agoAlpha
4 months agoJohna
4 months ago