A security analyst is investigating a malware incident at a company The malware is accessing a command-and-control website at www.comptia.com. All outbound internet traffic is logged to a syslog server and stored in /logfiles/messages Which of the following commands would be best for the analyst to use on the syslog server to search for recent traffic to the command-and-control website?
Eric
4 months agoAlbert
5 months agoRoyce
5 months agoEric
5 months agoKathrine
5 months agoVesta
5 months agoPortia
5 months agoOdelia
6 months agoKathrine
6 months agoPortia
6 months agoShaniqua
7 months agoLynette
6 months agoDonte
6 months agoSamira
6 months agoCarey
6 months agoMargarett
6 months agoJose
6 months agoHannah
6 months agoKiley
6 months agoGearldine
7 months agoAlishia
7 months agoFrancis
7 months ago