CompTIA PenTest+ PT0-002 Practice Question
As a penetration tester, you have been provided a binary file from a client who suspects it might contain malicious code. Your task is to analyze the functionality of this binary without executing it directly on your system. Which technique would best serve this purpose?
Disassembling the binary to view the assembly code for further clues to its functionality.
Executing the binary in a secure sandbox environment to observe its behavior.
Decompiling the binary to its source code to check for any suspicious functions.
Performing static analysis of the binary to understand its structure and behavior without executing it.