A security researcher wants to reverse engineer an executable file to determine if it is malicious. The file was found on an underused server and appears to contain a zero-day exploit. Which of the following can the researcher do to determine if the file is malicious in nature?
A. TCP/IP socket design review
B. Executable code review
C. OS Baseline comparison
D. Software architecture review
Answer: C. OS Baseline comparison
Computer Science & Information Technology
You might also like to view...
Which of the following is an ethical activity?
a) hacking b) plagiarism c) software piracy d) algorithm refinement
Computer Science & Information Technology
Which JFrame constant indicates that the program should terminate when the window is closed by the user?
a. TERMINATE_ON_CLOSE. b. IMMEDIATELY_CLOSE. c. EXIT_ON_CLOSE. d. All of the above.
Computer Science & Information Technology
Expression Web uses the ____ name for the home page.
A. index.html B. default.html C. first.html D. startpage.html
Computer Science & Information Technology
Which of the following expressions will yield 0.5?
a. 1 / 2 b. 1.0 / 2 c. (double) (1 / 2) d. (double) 1 / 2 e. 1 / 2.0
Computer Science & Information Technology