Notifications
Clear all
Topic starter
04/07/2022 5:48 pm
A malicious artifact was collected during an incident response procedure. A security analyst is unable to run it in a sandbox to understand its features and method of operation.
Which of the following procedures is the BEST approach to perform a further analysis of the malware's capabilities?
- A . Reverse engineering
- B . Dynamic analysis
- C . Strings extraction
- D . Static analysis
Suggested Answer: D