A cybersecurity analyst inspects DNS logs on a regular basis to identify possible IOCs that are not triggered by known signatures. The analyst reviews the following log snippet:
Which of the following should the analyst do next based on the information reviewed?
Janet
13 days agoJolanda
14 days agoArleen
15 days agoJunita
Joanna
21 hours agoMing
16 days ago