A security analyst is investigating a malware incident at a company The malware is accessing a command-and-control website at www.comptia.com. All outbound internet traffic is logged to a syslog server and stored in /logfiles/messages Which of the following commands would be best for the analyst to use on the syslog server to search for recent traffic to the command-and-control website?
Johna
6 months agoAlpha
6 months agoDustin
6 months agoFausto
6 months agoAlpha
6 months agoJohna
6 months ago