A security analyst is investigating a malware incident at a company The malware is accessing a command-and-control website at www.comptia.com. All outbound internet traffic is logged to a syslog server and stored in /logfiles/messages Which of the following commands would be best for the analyst to use on the syslog server to search for recent traffic to the command-and-control website?
Eric
6 months agoAlbert
6 months agoRoyce
6 months agoEric
6 months agoKathrine
6 months agoVesta
6 months agoPortia
7 months agoOdelia
7 months agoKathrine
7 months agoPortia
7 months agoShaniqua
8 months agoLynette
7 months agoDonte
7 months agoSamira
7 months agoCarey
8 months agoMargarett
8 months agoJose
8 months agoHannah
8 months agoKiley
8 months agoGearldine
8 months agoAlishia
8 months agoFrancis
8 months ago