At which layer in the Attack Infection Flow can CPU Level Emulation detect a malicious file?

Posted by: Pdfprep Category: 156-730 Tags: , ,

At which layer in the Attack Infection Flow can CPU Level Emulation detect a malicious file?
A . The malware binary
B . The Exploit stage
C . The shell code
D . The vulnerability

Answer: B

Leave a Reply

Your email address will not be published.