Which of the follow...
 
Notifications
Clear all

Which of the following procedures is the BEST approach to perform a further analysis of the malware's capabilities?

1 Posts
1 Users
0 Likes
175 Views
(@benninkcarrol)
Noble Member
Joined: 2 years ago
Posts: 687
Topic starter  

A malicious artifact was collected during an incident response procedure. A security analyst is unable to run it in a sandbox to understand its features and method of operation.

Which of the following procedures is the BEST approach to perform a further analysis of the malware's capabilities?

  • A . Reverse engineering
  • B . Dynamic analysis
  • C . Strings extraction
  • D . Static analysis

Show Answer Hide Answer

Suggested Answer: D

   
Quote
Topic Tags

Latest CompTIA CS0-002 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: