exam questions

Exam 350-201 All Questions

View all questions & answers for the 350-201 exam

Exam 350-201 topic 1 question 85 discussion

Actual exam question from Cisco's 350-201
Question #: 85
Topic #: 1
[All 350-201 Questions]

An engineer is utilizing interactive behavior analysis to test malware in a sandbox environment to see how the malware performs when it is successfully executed.
A location is secured to perform reverse engineering on a piece of malware. What is the next step the engineer should take to analyze this malware?

  • A. Run the program through a debugger to see the sequential actions
  • B. Unpack the file in a sandbox to see how it reacts
  • C. Research the malware online to see if there are noted findings
  • D. Disassemble the malware to understand how it was constructed
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
27ea763
3 months, 2 weeks ago
Selected Answer: A
A would be the smartest choice
upvoted 1 times
...
jay_c_an
8 months ago
this was on recent test question. Agree with A. Doesn't make sense to place it in a sandbox for online research.
upvoted 3 times
...
DrVoIP
8 months, 3 weeks ago
The next step the engineer should take is to run the program through a debugger to see the sequential actions. This will allow the engineer to step through the malware code and understand what it is doing at each step, including any malicious actions it may be attempting. Debugging can help the engineer identify potential vulnerabilities in the system and develop effective countermeasures. - chatGPT
upvoted 1 times
...
ETSec
9 months, 3 weeks ago
D. Disassemble the malware to understand how it was constructed After securing a location to perform reverse engineering on a piece of malware, the next step the engineer should take is to disassemble the malware. Disassembly is the process of converting machine code into assembly code, which is a more human-readable form of the code. This allows the engineer to understand how the malware was constructed and how it works. The engineer can also identify any malicious functions and understand the malware's behavior and purpose.
upvoted 1 times
...
danfer
1 year ago
Second sentence says the RE is about to perform - so I will go with D as it is part of RE and that is the next step.
upvoted 2 times
...
chongchangchi
1 year, 7 months ago
Selected Answer: A
for me it should be A is the answer "Run the program through a debugger to see the sequential actions" before in the first place why did you put and analyze the malware on a isolated sandbox if you have just search it online? They're a lot of tools to perform static and dynamic malware analysis like Malware STATIC Analysis tools: Hybrid Analysis Cuckoo Sandbox Jotti Valkyrie Sandbox Malware DYNAMIC Analysis tools: Process Explorer OpManager Monit Advanced Windows Service Manager Process Hacker Netwrix Service Monitor AnVir Task Manager please correct me if I'm wrong.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago