List of questions
Related questions
Question 34 - CS0-003 discussion
A security analyst received a malicious binary file to analyze. Which of the following is the best technique to perform the analysis?
A.
Code analysis
B.
Static analysis
C.
Reverse engineering
D.
Fuzzing
Your answer:
0 comments
Sorted by
Leave a comment first