Which of the follow...
 
Notifications
Clear all

Which of the following types of instructions should the analyst use to understand how the malware was obfuscated and to help deobfuscate it?

1 Posts
1 Users
0 Likes
233 Views
(@katterjohnoctavio)
Noble Member
Joined: 2 years ago
Posts: 721
Topic starter  

During an incident investigation, a security analyst acquired a malicious file that was used as a backdoor but was not detected by the antivirus application. After performing a reverse-engineering procedure, the analyst found that part of the code was obfuscated to avoid signature detection.

Which of the following types of instructions should the analyst use to understand how the malware was obfuscated and to help deobfuscate it?

  • A . MOV
  • B . ADD
  • C . XOR
  • D . SUB
  • E . MOVL

Show Answer Hide Answer

Suggested Answer: C

   
Quote
Topic Tags

Latest CompTIA CS0-002 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: