Here’s the Answer to the Question posted on Facebook
Q. You suspect that an executable file on a web server is malicious and includes a zero-day exploit. Which of the following steps can you take to verify your suspicious?
A. Perform a code review.
B. Perform an architecture review.
C. Perform a design review.
D. Perform an operating system baseline comparison.
Answer available until November 5, 2015.
|Get over 400 Security+ (SY0-401 questions here).|
See Chapter 5 of the CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide.