A security analyst has a sample of malicious software and needs to know what the sample does. The analyst runs the sample in a carefully-controlled and monitored virtual machine to observe the software's behavior. The approach of malware analysis can BEST be described as:

A. Static testing
B. Security control testing
C. White box testing
D. Sandboxing


Answer: D. Sandboxing

Computer Science & Information Technology

You might also like to view...

The most important protocol at the Internet layer is ____.

A. IP B. ICMP C. TCP D. UDP

Computer Science & Information Technology

Match the following objects with their definition

I. Table II. Form III. Report IV. Query V. View A. Used to enter, edit, delete or display records B. Provides an easy-to-read view of data C. Stores data in columns and rows D. Ask questions about the data E. Gives a different perspective

Computer Science & Information Technology

A cell is the intersection of a column and a row

Indicate whether the statement is true or false

Computer Science & Information Technology

To display the Printer dialog box, you select the Print Documents option, which is displayed by clicking the:

A) Finish & Merge button in the Finish group on the Mailings tab. B) Merge button in the Finish group on the Mailings tab. C) Finish & Merge button in the Merge group on the Mailings tab. D) Finish button in the Merge group on the Mailings tab.

Computer Science & Information Technology