اختبار شهادة محلل الأمن السيبراني CompTIA CySA+

السؤال 778 من 1040

كل الأسئلة

An incident responder was able to recover a binary file through the network traffic. The binary file was also found in some machines with anomalous behavior. Which of the following processes most likely can be performed to understand the purpose of the binary file?

الخيارات

  • A File debugging
  • B Traffic analysis
  • C Reverse engineering
  • D Machine isolation

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.