Free CompTIA PenTest+ PT0-002 Practice Question

As a penetration tester, you have been provided a binary file from a client who suspects it might contain malicious code. Your task is to analyze the functionality of this binary without executing it directly on your system. Which technique would best serve this purpose?

  • Performing static analysis of the binary to understand its structure and behavior without executing it.

  • Disassembling the binary to view the assembly code for further clues to its functionality.

  • Executing the binary in a secure sandbox environment to observe its behavior.

  • Decompiling the binary to its source code to check for any suspicious functions.

This question's topic:
CompTIA PenTest+ PT0-002 / 
Attacks and Exploits
Your Score:

Check or uncheck an objective to set which questions you will receive.