A security analyst is responding to an incident that is related to an unauthorized communication between systems. While triaging the event, the analyst obtains the following outputs:
Which of the following commands should the analyst use to terminate the malicious session?
Stooshmeister
6 days, 15 hours ago