Notifications
Clear all
Topic starter
A malicious artifact was collected during an incident response procedure. A security analyst is unable to run it in a sandbox to understand its features and method of operation .
Which of the following procedures is the BEST approach to perform a further analysis of the malware's capabilities?
- A . Reverse engineering
B. Dynamic analysis
C. Strings extraction
D. Static analysis
Suggested Answer: D
Posted : 25/11/2022 10:07 am