At which layer in the Attack Infection Flow can CPU Level Emulation detect a malicious file?
A. The malware binary
B. The Exploit stage
C. The shell code
D. The vulnerability
At which layer in the Attack Infection Flow can CPU Level Emulation detect a malicious file?
A. The malware binary
B. The Exploit stage
C. The shell code
D. The vulnerability