A security analyst is testing both Windows and Linux systems for unauthorized DNS zone transfers within a LAN on comptia.org from example.org. Which of the following commands should the security analyst use?
(Select two.)
C. dig -axfr comptia.org@example.org
D. ipconfig/flushDNS
E.
F. dig@example.org comptia.org