A forensic investigator encounters a suspicious executable on a compromised system, believed to be packed using a known program packer, and is password-protected. The investigator has knowledge of the tool used for packing and has the corresponding unpacking tool. What should be the next best course of action to examine the executable? A. Use the unpacking tool to decompress the executable, without dealing with the password B. Run a dynamic analysis on the packed executable in a controlled environment C. Decrypt the password to unpack the executable before analyzing D. Use reverse engineering to understand the attack tool hidden inside  Suggested Answer: B Community Answer: C This question is in 312-49V10 EC-Council Computer Hacking Forensic Investigator (CHFI) v10 Exam For getting EC-Council Computer Hacking Forensic Investigator (CHFI) Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by EC-Council. Trademarks, certification & product names are used for reference only and belong to EC-Council. The website does not contain actual questions and answers from EC-Council's Certification Exams.
Please login or Register to submit your answer