CompTIA PenTest+ PT0-002 Practice Question
As a penetration tester, you have been provided a binary file from a client who suspects it might contain malicious code. Your task is to analyze the functionality of this binary without executing it directly on your system. Which technique would best serve this purpose?
Executing the binary in a secure sandbox environment to observe its behavior.
Disassembling the binary to view the assembly code for further clues to its functionality.
Decompiling the binary to its source code to check for any suspicious functions.
Performing static analysis of the binary to understand its structure and behavior without executing it.