A security analyst is investigating a malware incident at a company. The malware is accessing a command-and-control website at www.comptia.com. All outbound Internet traffic is logged to a syslog server and stored in /logfiles/messages. Which of the following commands would be best for the analyst to use on the syslog server to search for recent traffic to the command-and-control website?
ApplebeesWaiter1122
Highly Voted 1 year, 9 months agoje123
1 year, 8 months agomalibi
Most Recent 1 year, 8 months agoEarthspirit
1 year, 8 months agoLinkinPark4evr
1 year, 8 months agomaxi84
1 year, 9 months agoAmesCB
1 year, 9 months agoGamsje
1 year, 9 months agomd4946
1 year, 9 months agomtnews
1 year, 9 months ago