A security analyst is investigating a reported phishing attempt that was received by many users throughout the company. The text of one of the emails is shown below:
Due to the size of the company and the high storage requirements, the company does not log DNS requests or perform packet captures of network traffic, but it does log network flow data. Which of the following commands will the analyst most likely execute NEXT?
el_taco_man
2 years ago2Fish
2 years, 1 month agoNerdAlert
1 year, 12 months ago