An application contains the following log entries in a file named “authlog.log”:
A security analyst has been asked to parse the log file and print out all valid usernames. Which of the following achieves this task?
A. grep -e “successfully” authlog.log | awk ‘{print $2}’ | sed s/\’//g
B. cat authlog.log | grep “2016-01-01” | echo “valid username found: $2”
C. echo authlog.log > sed ‘s/User//’ | print “username exists: $User”
D. cat “authlog.log” | grep “User” | cut -F’ ‘ | echo “username exists: $1”