Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified SOC Analyst (CSA v2) 312-39 Question # 35 Topic 4 Discussion

ECCouncil Certified SOC Analyst (CSA v2) 312-39 Question # 35 Topic 4 Discussion

312-39 Exam Topic 4 Question 35 Discussion:
Question #: 35
Topic #: 4

The SOC team found a suspicious document file on a user's workstation. Upon initial inspection, the document appears benign, but deeper analysis reveals an embedded PowerShell script. The team suspects the script is designed to download and execute a malicious payload. They need to understand the script's functionality without triggering it. Which malware analysis technique is recommended to understand the PowerShell script's functionality without executing it?


A.

Static analysis


B.

Dynamic analysis


C.

Automated behavioral analysis


D.

Network traffic analysis


Get Premium 312-39 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.