A cybersecurity analyst at a leading technology firm has discovered a suspicious file in the company ' s network. Concerned that it may be malware, the analyst decides to conduct both static and dynamic analysis to assess the potential threat posed by the file.
In the scenario described, what would be the primary purpose of conducting static analysis on the suspicious file?
Submit