[Day 7] Log analysis ‘Tis the season for log chopping!
How many unique IP addresses are connected to the proxy server? How many unique domains were accessed by all workstations? What status code is generated by the HTTP requests to the least accessed domain? Based on the high count of connection attempts, what is the name of the suspicious domain? What is the source IP of the