A security analyst has a sample of malicious software and needs to know what the sample does. The analyst runs the sample in a carefully-controlled and monitored virtual machine to observe the software's behavior. The approach of malware analysis can BEST be described as:
A. Static testing
B. Security control testing
C. White box testing
D. Sandboxing
Answer: D. Sandboxing
You might also like to view...
The most important protocol at the Internet layer is ____.
A. IP B. ICMP C. TCP D. UDP
Match the following objects with their definition
I. Table II. Form III. Report IV. Query V. View A. Used to enter, edit, delete or display records B. Provides an easy-to-read view of data C. Stores data in columns and rows D. Ask questions about the data E. Gives a different perspective
A cell is the intersection of a column and a row
Indicate whether the statement is true or false
To display the Printer dialog box, you select the Print Documents option, which is displayed by clicking the:
A) Finish & Merge button in the Finish group on the Mailings tab. B) Merge button in the Finish group on the Mailings tab. C) Finish & Merge button in the Merge group on the Mailings tab. D) Finish button in the Merge group on the Mailings tab.