Question 44


A company wants to perform analysis of a tool that is suspected to contain a malicious payload. A forensic analyst is given the following snippet:


Which of the following did the analyst use to determine the location of the malicious payload?

A. Code deduplicators

B. Binary reverse-engineering

C. Fuzz testing

D. Security containers

Correct Answer: B