CREST Practitioner Threat Intelligence Analyst CPTIA Question # 7 Topic 1 Discussion

CREST Practitioner Threat Intelligence Analyst CPTIA Question # 7 Topic 1 Discussion

CPTIA Exam Topic 1 Question 7 Discussion:
Question #: 7
Topic #: 1

Smith employs various malware detection techniques to thoroughly examine the

network and its systems for suspicious and malicious malware files. Among all

techniques, which one involves analyzing the memory dumps or binary codes for the

traces of malware?


A.

Live system


B.

Dynamic analysis


C.

Intrusion analysis


D.

Static analysis


Get Premium CPTIA Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.