A cybersecurity analyst inspects DNS logs on a regular basis to identify possible IOCs that are not triggered by known signatures. The analyst reviews the following log snippet:
Which of the following should the analyst do next based on the information reviewed?
Janet
1 years agoJolanda
1 years agoArleen
1 years agoTresa
1 years agoIlene
1 years agoLeeann
1 years agoGarry
1 years agoVilma
1 years agoJunita
1 years agoJoanna
1 years agoMing
1 years ago