PdfPrep.com

At which layer in the Attack Infection Flow can CPU Level Emulation detect a malicious file?

At which layer in the Attack Infection Flow can CPU Level Emulation detect a malicious file?
A . The malware binary
B . The Exploit stage
C . The shell code
D . The vulnerability

Answer: B

Exit mobile version