CompTIA PenTest+ PT0-002 Practice Question

As a penetration tester, you have been provided a binary file from a client who suspects it might contain malicious code. Your task is to analyze the functionality of this binary without executing it directly on your system. Which technique would best serve this purpose?

  • Executing the binary in a secure sandbox environment to observe its behavior.

  • Disassembling the binary to view the assembly code for further clues to its functionality.

  • Decompiling the binary to its source code to check for any suspicious functions.

  • Performing static analysis of the binary to understand its structure and behavior without executing it.

CompTIA PenTest+ PT0-002
Attacks and Exploits
Your Score:
Settings & Objectives

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot