CompTIA PenTest+ PT0-002 Practice Question

As a penetration tester, you have been provided a binary file from a client who suspects it might contain malicious code. Your task is to analyze the functionality of this binary without executing it directly on your system. Which technique would best serve this purpose?

  • Disassembling the binary to view the assembly code for further clues to its functionality.

  • Executing the binary in a secure sandbox environment to observe its behavior.

  • Decompiling the binary to its source code to check for any suspicious functions.

  • Performing static analysis of the binary to understand its structure and behavior without executing it.

CompTIA PenTest+ PT0-002
Attacks and Exploits
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot