A security analyst is investigating a malware incident at a company The malware is accessing a command-and-control website at www.comptia.com. All outbound internet traffic is logged to a syslog server and stored in /logfiles/messages Which of the following commands would be best for the analyst to use on the syslog server to search for recent traffic to the command-and-control website?
Eric
7 months agoAlbert
7 months agoRoyce
7 months agoEric
7 months agoKathrine
8 months agoVesta
8 months agoPortia
8 months agoOdelia
8 months agoKathrine
8 months agoPortia
9 months agoShaniqua
9 months agoLynette
9 months agoDonte
9 months agoSamira
9 months agoCarey
9 months agoMargarett
9 months agoJose
9 months agoHannah
9 months agoKiley
9 months agoGearldine
10 months agoAlishia
10 months agoFrancis
10 months ago